Sélection de la langue

Search

Sommaire du brevet 2442814 

Énoncé de désistement de responsabilité concernant l'information provenant de tiers

Une partie des informations de ce site Web a été fournie par des sources externes. Le gouvernement du Canada n'assume aucune responsabilité concernant la précision, l'actualité ou la fiabilité des informations fournies par les sources externes. Les utilisateurs qui désirent employer cette information devraient consulter directement la source des informations. Le contenu fourni par les sources externes n'est pas assujetti aux exigences sur les langues officielles, la protection des renseignements personnels et l'accessibilité.

Disponibilité de l'Abrégé et des Revendications

L'apparition de différences dans le texte et l'image des Revendications et de l'Abrégé dépend du moment auquel le document est publié. Les textes des Revendications et de l'Abrégé sont affichés :

  • lorsque la demande peut être examinée par le public;
  • lorsque le brevet est émis (délivrance).
(12) Demande de brevet: (11) CA 2442814
(54) Titre français: SYSTEME ET PROCEDE POUR EFFECTUER DES OPERATIONS DE PAIEMENT SURES
(54) Titre anglais: SYSTEM AND METHOD FOR CONDUCTING SECURE PAYMENT TRANSACTIONS
Statut: Réputée abandonnée et au-delà du délai pour le rétablissement - en attente de la réponse à l’avis de communication rejetée
Données bibliographiques
(51) Classification internationale des brevets (CIB):
  • G06Q 20/22 (2012.01)
  • G06Q 20/40 (2012.01)
(72) Inventeurs :
  • HOGAN, EDWARD J. (Etats-Unis d'Amérique)
  • CAMPBELL, CARL (Etats-Unis d'Amérique)
  • KRANZLEY, ARTHUR (Etats-Unis d'Amérique)
  • RUTHERFORD, BRUCE (Etats-Unis d'Amérique)
  • ORFEI, STEPHEN (Etats-Unis d'Amérique)
(73) Titulaires :
  • MASTERCARD INTERNATIONAL INCORPORATED
(71) Demandeurs :
  • MASTERCARD INTERNATIONAL INCORPORATED (Etats-Unis d'Amérique)
(74) Agent: SMART & BIGGAR LP
(74) Co-agent:
(45) Délivré:
(86) Date de dépôt PCT: 2002-04-02
(87) Mise à la disponibilité du public: 2002-10-10
Requête d'examen: 2007-03-02
Licence disponible: S.O.
Cédé au domaine public: S.O.
(25) Langue des documents déposés: Anglais

Traité de coopération en matière de brevets (PCT): Oui
(86) Numéro de la demande PCT: PCT/US2002/010356
(87) Numéro de publication internationale PCT: WO 2002079911
(85) Entrée nationale: 2003-10-01

(30) Données de priorité de la demande:
Numéro de la demande Pays / territoire Date
09/886,485 (Etats-Unis d'Amérique) 2001-06-22
09/886,486 (Etats-Unis d'Amérique) 2001-06-22
09/963,274 (Etats-Unis d'Amérique) 2001-09-26
60/280,776 (Etats-Unis d'Amérique) 2001-04-02
60/295,630 (Etats-Unis d'Amérique) 2001-06-04
60/307,575 (Etats-Unis d'Amérique) 2001-07-24

Abrégés

Abrégé français

L'invention concerne un système de paiement électronique sûr dans lequel des données d'authentification sont envoyées d'un émetteur de comptes de paiement à un logiciel utilisateur exploité par un acheteur. Le logiciel utilisateur envoie les données d'authentification à un commerçant en utilisant des champs cachés dans la page web de ce dernier. Le commerçant produit un message de demande d'autorisation basé sur les données d'authentification. Le message de demande d'autorisation est envoyé à un organisme de paiement soit directement depuis le commerçant, soit par l'acquéreur du commerçant. L'organisme de paiement transmet le message de demande d'autorisation à un émetteur de comptes de paiement. Celui-ci vérifie le message de demande d'autorisation et produit un message de réponse d'autorisation, lequel est envoyé à l'organisme de paiement. L'organisme de paiement transmet au commerçant le message de réponse d'autorisation soit directement, soit par l'intermédiaire de l'acquéreur.


Abrégé anglais


In a secure electronic payment, authentication data is sent from a payment
account issuer (406) to user software (402) operated by a purchaser. The user
software sends the authentication data to a merchant (404) using hidden fields
on the Web page of the merchant (404). The merchant (404) generates an
authorization request message based upon the authentication data. The
authorization request message is sent to a payment organization (408) either
directly from the merchant (404) or via the merchant's acquirer. The payment
organization (408) forwards the authorization request message to a payment
account issuer (406) which verifies the authorization request message, thereby
generating an authorization response message which is sent to the payment
organization (408). The payment organization (408) forwards the authorization
response message to the merchant (404), either directly or via the acquirer.

Revendications

Note : Les revendications sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CLAIMS
1. A method for performing a payment transaction, comprising:
receiving a set of Web page data by user software, the set of Web page
data being for displaying a Web page;
determining, by the user software, whether the Web page includes at
least one hidden field;
if the Web page includes the at least one hidden field, selecting a first
payment procedure to be used for performing the particular payment
transaction, the
first payment procedure including filling the at least one hidden field with
hidden
data, by the user software, for sending the hidden data to a merchant; and
if the Web page does not include the at least one hidden field, selecting
a second payment procedure to be used for performing the particular payment
transaction, the second payment procedure including filling at least one
visible field
with purchase data, for sending the purchase data to the merchant, the at
least one
visible field being included in the Web page.
2. A method according to claim 1, wherein the first payment procedure
further includes receiving, by the user software, authentication data from a
payment
account issuer, the hidden data comprising the authentication data, and the
authentication data being for authenticating an identity of an account holder
of a
payment account issued by the payment account issuer.
3. A method according to claim 2, wherein the first payment procedure
further includes sending, from the user software to the payment account
issuer, a
request for authentication of the identity of the account holder, the
authentication data
being sent from the payment account issuer to the user software in response to
the
request for the authentication of the identity of the account holder.
4. A method according to claim 3, wherein the first payment procedure
further includes the steps of:
-41-

sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
5. A method according to claim 3, wherein the first payment procedure
further includes the steps of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
-42-

sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
6. A method according to claim 2, wherein the first payment procedure
further includes the steps of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authorization data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
7. A method according to claim 2, wherein the first payment procedure
further includes the steps of:
-43-

sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
8. A method according to claim 1, wherein the first payment procedure
further includes the steps of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
hidden data;
sending, from the payment organization to a payment account issuer, at
least one of the authorization request message and a message derived from the
authorization request message;
-44-

using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
9. A method according to claim 8, wherein the hidden data include at
least data associated with the particular payment transaction, and the
verification
procedure comprises the steps of:
determining by the payment account issuer whether the data associated
with the particular payment transaction have been previously used for
authorizing any
payment transaction; and
if the data associated with the particular payment transaction have been
previously used for authorizing any payment transaction, including a denial of
authorization in the authorization response message.
10. A method according to claim 1, wherein the first payment procedure
further includes the steps of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
hidden data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to a payment account issuer, at
least one of the at least one of the first and second authorization request
messages and
a third authorization request message derived from the at least one of the
first and
second authorization request messages;
-45-

using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
11. A method according to claim 10, wherein the hidden data include at
least data associated with the particular payment transaction, and the
verification
procedure comprises the steps of:
determining by the payment account issuer whether the data associated
with the particular payment transaction have been previously used for
authorizing any
payment transaction; and
if the data associated with the particular payment transaction have been
previously used for authorizing any payment transaction, including a denial of
authorization in the first authorization response message.
12. A method according to claim 1, wherein the first payment procedure
further includes the steps of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
hidden data;
using, by the payment organization, a verification procedure to process
the authorization request message, for generating an authorization response
message;
and
-46-

sending the authorization response message from the payment
organization to the merchant.
13. A method according to claim 1, wherein the first payment procedure
further includes the steps of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
hidden data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
using, by the payment organization, a verification procedure to process
the at least one of the first and second authorization request messages, for
generating
a first authorization response message;
sending the first authorization response message from the payment
organization to the acquirer; and
sending, from the acquirer to the merchant, at least one of the first
authorization response message and a second authorization response message
derived
from the first authorization response message.
14. A method for performing a payment transaction, comprising:
receiving a set of Web page data by user software, the set of Web page
data being for displaying a Web page, and the Web page including at least one
hidden
field;
receiving, by the user software, authentication data from a payment
account issuer, the authentication data being for authenticating an identity
of an
account holder of a payment account issued by the payment account issuer; and
filling the at least one hidden field with the authentication data, by the
user software, for sending the authentication data to a merchant.
15. A method according to claim 14, further comprising sending, from the
user software to the payment account issuer, a request for authentication of
the
identity of the account holder, the authentication data being sent from the
payment
-47-

account issuer to the user software in response to the request for the
authentication of
the identity of the account holder.
16. A method according to claim 15, further comprising:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
17. A method according to claim 15, further comprising:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
-4~-

using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
18. A method according to claim 14, further comprising:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
19. A method according to claim 14, further comprising:
-49-

sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
20. A method according to claim 14, further comprising:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
using, by the payment organization, a verification procedure to process
the authorization request message, for generating an authorization response
message;
and
-50-

sending the authorization response message from the payment
organization to the merchant.
21. A method according to claim 14, further comprising:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
using, by the payment organization, a verification procedure to process
the at least one of the first and second authorization request messages, for
generating
a first authorization response message;
sending the first authorization response message from the payment
organization to the acquirer; and
sending, from the acquirer to the merchant, at least one of the first
authorization response message and a second authorization response message
derived
from the first authorization response message.
22. A method for performing a payment transaction, comprising:
receiving a first set of Web page data by user software, the first set of
Web page data being for displaying a first Web page;
determining, by the user software, whether the first Web page includes
a first hidden field, the first hidden field being for indicating to the user
software that
the first Web page is capable of being used for performing a single-click
payment
procedure; and
if the first Web page includes the first hidden field, filling the first
hidden field, by the user software, with data for informing a merchant that
the user
software is being used for performing at least one payment transaction.
23. A method according to claim 22, further comprising selecting, by an
account holder, the single-click payment procedure to be performed using the
first
Web page.
-51-

24. A method according to claim 23, further comprising the steps of:
receiving a second set of Web page data by the user software, the
second set of Web page data representing a second Web page, the second Web
page
including a second hidden field and a hidden button;
filling the second hidden field with authentication data, by the user
software, for sending the authentication data to the merchant, the
authentication data
being for authenticating an identity of the account holder; and
clicking on the hidden button by the user software, for initiating
transmission of the authentication data to the merchant.
25. A method according to claim 24, further comprising receiving the
authentication data, by the user software, from a payment account issuer which
has
issued a payment account to the account holder.
26. A method according to claim 25, further comprising:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
-52-

27. A method according to claim 25, further comprising:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
2g. An apparatus for performing a payment transaction, comprising:
a first user processor for receiving a set of Web page data, the set of
Web page data being for displaying a Web page;
a second user processor for determining whether the Web page
includes at least one hidden field;
a processor for selecting a first payment system to be used for
performing a particular payment transaction if the Web page includes the at
least one
-53-

hidden field, the first payment system comprising a third user processor for
filling the
at least one hidden field with hidden data, for sending the hidden data to a
merchant;
and
a processor for selecting a second payment system to be used for
performing the particular payment transaction if the Web page does not include
the at
least one hidden field, the second payment system comprising a processor for
filling
at least one visible field with purchase data, for sending the purchase data
to the
merchant, the at least one visible field being included in the Web page.
29. An apparatus according to claim 28, wherein the first payment system
further comprises:
a payment account issuer for issuing a payment account to an account
holder; and
a fourth user processor for receiving authentication data from the
payment account issuer, the hidden data comprising the authentication data,
and the
authentication data being for authenticating an identity of the account
holder.
30. An apparatus according to claim 29, wherein the first payment system
further comprises a fifth user processor for sending, to the payment account
issuer, a
request for authentication of the identity of the account holder, the
authentication data
being sent from the payment account issuer to the fourth user processor in
response to
the request for the authentication of the identity of the account holder.
31. An apparatus according to claim 30, wherein the first payment system
further comprises a payment organization for receiving an authorization
request
message from the merchant, the authorization request message being derived
from the
authentication data, the payment organization being further for sending, to
the
payment account issuer, at least one of the authorization request message and
a
message derived from the authorization request message, the payment account
issuer
comprising a verification processor for verifying the at least one of the
authorization
request message and the message derived from the authorization request
message, for
generating an authorization response message, the payment account issuer being
further for sending the authorization response message to the payment
organization,
-54-

and the payment organization being further for sending, to the merchant, at
least one
of the authorization response message and a message derived from the
authorization
response message.
32. An apparatus according to claim 30, wherein the first payment system
further comprises:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
authentication data; and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
being
further for sending, to the payment account issuer, at least one of the at
least one of
the first and second authorization request messages and a third authorization
request
message derived from the at least one of the first and second authorization
request
messages, the payment account issuer comprising a verification processor for
verifying the at least one of the at least one of the first and second
authorization
request messages and the third authorization request message, for generating a
first
authorization response message, the payment account issuer being further for
sending
the first authorization response message to the payment organization, the
payment
organization being further for sending, to the acquirer, at least one of the
first
authorization response message and a second authorization response message
derived
from the first authorization response message, and the acquirer being further
for
sending, to the merchant, at least one of the at least one of the first and
second
authorization response messages and a third authorization response message
derived
from the at least one of the first and second authorization response messages.
33. An apparatus according to claim 29, wherein the first payment system
further comprises a payment organization for receiving an authorization
request
message from the merchant, the authorization request message being derived
from the
authorization data, the payment organization being further for sending, to the
payment
account issuer, at least one of the authorization request message and a
message
-55-

derived from the authorization request message, the payment account issuer
comprising a verification processor for verifying the at least one of the
authorization
request message and the message derived from the authorization request
message, for
generating an authorization response message, the payment account issuer being
further for sending the authorization response message to the payment
organization,
and the payment organization being further for sending, to the merchant, at
least one
of the authorization response message and a message derived from the
authorization
response message.
34. An apparatus according to claim 29, wherein the first payment system
further comprises:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
authentication data; and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
being
further for sending, to the payment account issuer, at least one of the at
least one of
the first and second authorization request messages and a third authorization
request
message derived from the at least one of the first and second authorization
request
messages, the payment account issuer comprising a verification processor for
verifying the at least one of the at least one of the first and second
authorization
request messages and the third authorization request message, for generating a
first
authorization response message, the payment account issuer being further for
sending
the first authorization response message to the payment organization, the
payment
organization being for sending, to the acquirer, at least one of the first
authorization
response message and a second authorization response message derived from the
first
authorization response message, and the acquirer being further for sending, to
the
merchant, at least one of the at least one of the first and second
authorization response
messages and a third authorization response message derived from the at least
one of
the first and second authorization response messages.
-56-

35. An apparatus according to claim 28, wherein the first payment system
further comprises:
a payment account issuer; and
a payment organization for receiving an authorization request message
from the merchant, the authorization request message being derived from the
hidden
data, the payment organization being further for sending, to the payment
account
issuer, at least one of the authorization request message and a message
derived from
the authorization request message, the payment account issuer comprising a
verification processor for verifying the at least one of the authorization
request
message and the message derived from the authorization request message, for
generating an authorization response message, the payment account issuer being
for
sending the authorization response message to the payment organization, and
the
payment organization being further for sending, to the merchant, at least one
of the
authorization response message and a message derived from the authorization
response message.
36. An apparatus according to claim 35, wherein the hidden data include at
least data associated with the particular payment transaction, and the
verification
processor comprises:
a processor for determining whether the data associated with the
particular payment transaction have been previously used for authorizing any
payment
transaction; and
a processor for including a denial of authorization in the authorization
response message if the data associated with the particular payment
transaction have
been previously used for authorizing any payment transaction.
37. An apparatus according to claim 28, wherein the first payment system
further comprises:
a payment account issuer;
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
hidden data;
and
-57-

a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
being
further for sending, to the payment account issuer, at least one of the at
least one of
the first and second authorization request messages and a third authorization
request
message derived from the at least one of the first and second authorization
request
messages, the payment account issuer comprising a verification processor for
verifying the at least one of the at least one of the first and second
authorization
request messages and the third authorization request message, for generating a
first
authorization response message, the payment account issuer being for sending
the first
authorization response message to the payment organization, the payment
organization being further for sending, to the acquirer, at least one of the
first
authorization response message and a second authorization response message
derived
from the first authorization response message, and the acquirer being further
for
sending, to the merchant, at least one of the at least one of the first and
second
authorization response messages and a third authorization response message
derived
from the at least one of the first and second authorization response messages.
38. An apparatus according to claim 37, wherein the hidden data include at
least data associated with the particular payment transaction, and the
verification
processor comprises:
a processor for determining whether the data associated with the
particular payment transaction have been previously used for authorizing any
payment
transaction; and
a processor for including a denial of authorization in the first
authorization response message if the data associated with the particular
payment
transaction have been previously used for authorizing any payment transaction.
39. An apparatus according to claim 28, wherein the first payment system
further comprises a payment organization for receiving an authorization
request
message from the merchant, the authorization request message being derived
from the
hidden data, the payment organization comprising a verification processor for
-58-

verifying the authorization request message, for generating an authorization
response
message, and the payment organization being further for sending the
authorization
response message to the merchant.
40. An apparatus according to claim 28, wherein the first payment system
further comprises:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
hidden data;
and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
comprising a verification processor for verifying the at least one of the
first and
second authorization request messages, for generating a first authorization
response
message, the payment organization being further for sending the first
authorization
response message to the acquirer; and the acquirer being further for sending,
to the
merchant, at least one of the first authorization response message and a
second
authorization response message derived from the first authorization response
message.
41. An apparatus for performing a payment transaction, comprising:
a first user processor for receiving a set of Web page data, the set of
Web page data being for displaying a Web page, and the Web page including at
least
one hidden field;
a payment account issuer for issuing a payment account to an account
holder;
a second user processor for receiving authentication data from the
payment account issuer, the authentication data being for authenticating an
identity of
the account holder; and
a third user processor for filling the at least one hidden field with the
authentication data, for sending the authentication data to a merchant.
42. An apparatus according to claim 41, further comprising a fourth user
processor for sending, to the payment account issuer, a request for
authentication of
-59-

the identity of the account holder, the authentication data being sent from
the payment
account issuer to the second user processor in response to the request for the
authentication of the identity of the account holder.
43. An apparatus according to claim 42, further comprising a payment
organization for receiving an authorization request message from the merchant,
the
authorization request message being derived from the authentication data, the
payment organization being further for sending, to the payment account issuer,
at least
one of the authorization request message and a message derived from the
authorization request message, the payment account issuer comprising a
verification
processor for verifying the at least one of the authorization request message
and the
message derived from the authorization request message, for generating an
authorization response message, the payment account issuer being further for
sending
the authorization response message to the payment organization; and the
payment
organization being for sending, to the merchant, at least one of the
authorization
response message and a message derived from the authorization response
message.
44. An apparatus according to claim 42, further comprising:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
authentication data; and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
being
further for sending, to the payment account issuer, at least one of the at.
least one of
the first and second authorization request messages and a third authorization
request
message derived from the at least one of the first and second authorization
request
messages, the payment account issuer comprising a verification processor for
verifying the at least one of the at least one of the first and second
authorization
request messages and the third authorization request message, for generating a
first
authorization response message, the payment account issuer being further for
sending
first authorization response message to the payment organization, the payment
-60-

organization being further for sending, to the acquirer, at least one of the
first
authorization response message and a second authorization response message
derived
from the first authorization response message, and the acquirer being further
for
sending, to the merchant, at least one of the at least one of the first and
second
authorization response messages and a third authorization response message
derived
from the at least one of the first and second authorization response messages.
45. An apparatus according to claim 41, further comprising a payment
organization for receiving an authorization request message from the merchant,
the
authorization request message being derived from the authentication data, the
payment organization being further for sending, to the payment account issuer,
at least
one of the authorization request message and a message derived from the
authorization request message, the payment account issuer comprising a
verification
processor for verifying the at least one of the authorization request message
and the
message derived from the authorization request message, for generating an
authorization response message, the payment account issuer being further for
sending
the authorization response message to the payment organization; and the
payment
organization being for sending, to the merchant, at least one of the
authorization
response message and a message derived from the authorization response
message.
46. An apparatus according to claim 41, further comprising:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
authentication data; and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
being
further for sending, to the payment account issuer, at least one of the at
least one of
the first and second authorization request messages and a third authorization
request
message derived from the at least one of the first and second authorization
request
messages, the payment account issuer comprising a verification processor for
verifying the at least one of the at least one of the first and second
authorization
-61-

request messages and the third authorization request message, for generating a
first
authorization response message, the payment account issuer being further for
sending
the first authorization response message to the payment organization, the
payment
organization being further for sending, to the acquirer, at least one of the
first
authorization response message and a second authorization response message
derived
from the first authorization response message, and the acquirer being further
for
sending, to the merchant, at least one of the at least one of the first and
second
authorization response messages and a third authorization response message
derived
from the at least one of the first and second authorization response messages.
47. An apparatus according to claim 41, further comprising a payment
organization for receiving an authorization request message from the merchant,
the
authorization request message being derived from the authentication data, the
payment organization comprising a verification processor for verifying the
authorization request message, for generating an authorization response
message, and
the payment organization being further for sending the authorization response
message to the merchant.
48. An apparatus according to claim 41, further comprising:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
authentication data; and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
comprising a verification processor for verifying the at least one of the
first and
second authorization request messages, for generating a first authorization
response
message, the payment organization being further for sending the first
authorization
response message to the acquirer, and the acquirer being further for sending,
to the
merchant, at least one of the first authorization response message and a
second
authorization response message derived from the first authorization response
message.
-62-

49. An arrangement for performing a payment transaction, comprising:
a first user processor for receiving a first set of Web page data, the first
set of Web page data being for displaying a first Web page;
a second user processor for determining whether the first Web page
includes a first hidden field, the first hidden field being for indicating to
the user
software that the first Web page is capable of being used, by a single-click
payment
system, to perform at least one payment transaction;
a third user processor for, if the first Web page includes the first hidden
field, filling the first hidden field with data for informing a merchant that
the user
processor is being used for performing the at least one payment transaction.
50. An arrangement according to claim 49, further comprising an account
holder for selecting the single-click payment procedure to be performed using
the first
Web page.
51. An arrangement according to claim 50, further comprising:
a fourth user processor for receiving a second set of Web page data, the
second set of Web page data representing a second Web page, the second Web
page
including a second hidden field and a hidden button;
a fifth user processor for filling the second hidden field with
authentication data, for sending the authentication data to the merchant, the
authentication data being for authenticating an identity of the account
holder; and
a sixth user processor for clicking on the hidden button, for initiating
transmission of the authentication data to the merchant.
52. An arrangement according to claim 51, further comprising:
a payment account issuer for issuing a payment account to the account
holder; and
a seventh user processor for receiving the authentication data from the
payment account issuer.
53. An arrangement according to claim 52, further comprising a payment
organization for receiving an authorization request message from the merchant,
the
-63-

authorization request message being derived from the authentication data, the
payment organization being further for sending, to the payment account issuer,
at least
one of the authorization request message and a message derived from the
authorization request message, the payment account issuer comprising a
verification
processor for verifying the at least one of the authorization request message
and the
message derived from the authorization request message, for generating an
authorization response message, the payment account issuer being further for
sending
the authorization response message to the payment organization, and the
payment
organization being further for sending, to the merchant, at least one of the
authorization response message and a message derived from the authorization
response message.
54. An arrangement according to claim 52, further comprising:
an acquirer for receiving a first authorization request message from the
merchant, the first authorization request message being derived from the
authentication data; and
a payment organization for receiving, from the acquirer, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message, the payment organization
being
further for sending, to the payment account issuer, at least one of the at
least one of
the first and second authorization request messages and a third authorization
request
message derived from the at least one of the first and second authorization
request
messages, the payment account issuer comprising a verification processor for
verifying the at least one of the at least one of the first and second
authorization
request messages and the third authorization request message, for generating a
first
authorization response message, the payment account issuer being further for
sending
the first authorization response message to the payment organization, the
payment
organization being further for sending, to the acquirer, at least one of the
first
authorization response message and a second authorization response message
derived
from the first authorization response message, and the acquirer being further
for
sending, to the merchant, at least one of the at least one of the first and
second
-64-

authorization response messages and a third authorization response message
derived
from the at least one of the first and second authorization response messages.
55. A computer-readable medium having a set of instructions operable to
direct a processor to perform the steps of:
receiving a set of Web page data by a user processor, the set of Web
page data being for displaying a Web page;
determining, by the user processor, whether the Web page includes at
least one hidden field;
if the Web page includes the at least one hidden field, selecting a first
payment procedure to be used for performing a particular payment transaction,
the
first payment procedure including filling the at least one hidden field with
hidden
data, by the user processor, for sending the hidden data to a merchant; and
if the Web page does not include the at least one hidden field, selecting
a second payment procedure to be used for performing the particular payment
transaction, the second payment procedure including filling at least one
visible field
with purchase data, for sending the purchase data to the merchant, the at
least one
visible field being included in the Web page.
56. A computer-readable medium according to claim 55, wherein the first
payment procedure further includes receiving, by the user processor,
authentication
data from a payment account issuer, the hidden data comprising the
authentication
data, and the authentication data being for authenticating an identity of an
account
holder of a payment account issued by the payment account issuer.
57. A computer-readable medium according to claim 56, wherein the first
payment procedure further includes sending, from the user processor to the
payment
account issuer, a request for authentication of the identity of the account
holder, the
authentication data being sent from the payment account issuer to the user
processor
in response to the request for the authentication of the identity of the
account holder.
58. A computer-readable medium according to claim 57, wherein the first
payment procedure further includes the steps of:
-65-

sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
59. A computer-readable medium according to claim 57, wherein the first
payment procedure further includes the steps of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
-66-

sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
60. A computer-readable medium according to claim 56, wherein the first
payment procedure further includes the steps of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authorization data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
61. A computer-readable medium according to claim 56, wherein the first
payment procedure further includes the steps of:
-67-

sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
62. A computer-readable medium according to claim 55, wherein the first
payment procedure further includes the steps of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
hidden data;
sending, from the payment organization to a payment account issuer, at
least one of the authorization request message and a message derived from the
authorization request message;
-68-

using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
63. A computer-readable medium according to claim 62, wherein the
hidden data include at least data associated with the particular payment
transaction,
and the verification procedure comprises the steps of:
determining by the payment account issuer whether the data associated
with the particular payment transaction have been previously used for
authorizing any
payment transaction; and
if the data associated with the particular payment transaction have been
previously used for authorizing any payment transaction, including a denial of
authorization in the authorization response message.
64. A computer-readable medium according to claim 55, wherein the first
payment procedure further includes the steps of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
hidden data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to a payment account issuer, at
least one of the at least one of the first and second authorization request
messages and
a third authorization request message derived from the at least one of the
first and
second authorization request messages;
-69-

using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
65. A computer-readable medium according to claim 64, wherein the
hidden data include at least data associated with the particular payment
transaction,
and the verification procedure comprises the steps of:
determining by the payment account issuer whether the data associated
with the particular payment transaction have been previously used for
authorizing any
payment transaction; and
if the data associated with the particular payment transaction have been
previously used for authorizing any payment transaction, including a denial of
authorization in the first authorization response message.
66. A computer-readable medium according to claim 55, wherein the first
payment procedure further includes the steps of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
hidden data;
using, by the payment organization, a verification procedure to process
the authorization request message, for generating an authorization response
message;
and
-70-

sending the authorization response message from the payment
organization to the merchant.
67. A computer-readable medium according to claim 55, wherein the first
payment procedure further includes the steps of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
hidden data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
using, by the payment organization, a verification procedure to process
the at least one of the first and second authorization request messages, for
generating
a first authorization response message;
sending the first authorization response message from the payment
organization to the acquirer; and
sending, from the acquirer to the merchant, at least one of the first
authorization response message and a second authorization response message
derived
from the first authorization response message.
68. A computer-readable medium having a set of instructions operable to
direct at least one processor to perform the steps of:
receiving a set of Web page data by a user processor, the set of Web
page data being for displaying a Web page, and the Web page including at least
one
hidden field;
receiving, by the user processor, authentication data from a payment
account issuer, the authentication data being for authenticating an identity
of an
account holder of a payment account issued by the payment account issuer; and
filling the at least one hidden field with the authentication data, by the
user processor, for sending the authentication data to a merchant.
69. A computer-readable medium according to claim 68, wherein the set of
instructions is further operable to direct the at least one processor to
perform the step
of sending, from the user processor to the payment account issuer, a request
for
-71-

authentication of the identity of the account holder, the authentication data
being sent
from the payment account issuer to the user processor in response to the
request for
the authentication of the identity of the account holder.
70. A computer-readable medium according to claim 69, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
71. A computer-readable medium according to claim 69, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
-72-

sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
72. A computer-readable medium according to claim 68, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
-73-

sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
73. A computer-readable medium according to claim 68, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
-74-

74. A computer-readable medium according to claim 68, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
using, by the payment organization, a verification procedure to process
the authorization request message, for generating an authorization response
message;
and
sending the authorization response message from the payment
organization to the merchant.
75. A computer-readable medium according to claim 68, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
using, by the payment organization, a verification procedure to process
the at least one of the first and second authorization request messages, for
generating
a first authorization response message;
sending the first authorization response message from the payment
organization to the acquirer; and
sending, from the acquirer to the merchant, at least one of the first
authorization response message and a second authorization response message
derived
from the first authorization response message.
76. A computer-readable medium having a set of instructions operable to
direct a processor to perform the steps of:
-75-

receiving a first set of Web page data by a user processor, the first set
of Web page data being for displaying a first Web page;
determining, by the user processor, whether the first Web page
includes a first hidden field, the first hidden field being for indicating to
the user
software that the first Web page is capable of being used for performing a
single-click
payment procedure; and
if the first Web page includes the first hidden field, filling the first
hidden field, by the user processor, with data for informing a merchant that
the user
software is being used for performing at least one payment transaction.
77. A method according to claim 76, wherein the set of instructions is
further operable to direct the at least one processor to perform the step of
receiving,
from an account holder, a signal for selecting the single-click payment
procedure to
be performed using the first Web page.
78. A method according to claim 77, wherein the set of instructions is
further operable to direct the at least one processor to perform the steps of:
receiving a second set of Web page data by the user processor, the
second set of Web page data representing a second Web page, the second Web
page
including a second hidden field and a hidden button;
filling the second hidden field with authentication data, by the user
processor, for sending the authentication data to the merchant, the
authentication data
being for authenticating an identity of the account holder; and
clicking on the hidden button by the user processor, for initiating
transmission of the authentication data to the merchant.
79. A method according to claim 78, wherein the set of instructions is
further operable to direct the at least one processor to perform the step of
receiving
the authentication data, by the user processor, from a payment account issuer
which
has issued a payment account to the account holder.
-76-

80. A computer-readable medium according to claim 79, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending an authorization request message from the merchant to a
payment organization, the authorization request message being derived from the
authentication data;
sending, from the payment organization to the payment account issuer,
at least one of the authorization request message and a message derived from
the
authorization request message;
using, by the payment account issuer, a verification procedure to
process the at least one of the authorization request message and the message
derived
from the authorization request message, for generating an authorization
response
message;
sending the authorization response message from the payment account
issuer to the payment organization; and
sending, from the payment organization to the merchant, at least one of
the authorization response message and a message derived from the
authorization
response message.
81. A computer-readable medium according to claim 79, wherein the set of
instructions is further operable to direct the at least one processor to
perform the steps
of:
sending a first authorization request message from the merchant to an
acquirer, the first authorization request message being derived from the
authentication
data;
sending, from the acquirer to a payment organization, at least one of
the first authorization request message and a second authorization request
message
derived from the first authorization request message;
sending, from the payment organization to the payment account issuer,
at least one of the at least one of the first and second authorization request
messages
and a third authorization request message derived from the at least one of the
first and
second authorization request messages;
-77-

using, by the payment account issuer, a verification procedure to
process the at least one of the at least one of the first and second
authorization request
messages and the third authorization request message, for generating a first
authorization response message;
sending the first authorization response message from the payment
account issuer to the payment organization;
sending, from the payment organization to the acquirer, at least one of
the first authorization response message and a second authorization response
message
derived from the first authorization response message; and
sending, from the acquirer to the merchant, at least one of the at least
one of the first and second authorization response messages and a third
authorization
response message derived from the at least one of the first and second
authorization
response messages.
-78-

Description

Note : Les descriptions sont présentées dans la langue officielle dans laquelle elles ont été soumises.


CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
SYSTEM AND METHOD FOR CONDUCTING
SECURE PAYMENT TRANSACTIONS
SPECIFICATION
CROSS-REFERENCE TO RELATED APPLICATIONS
This application is a continuation-in-part of U.S. Patent Application
No. 09/963,274, entitled "A Universal and Interoperable System and Method
Utilizing
a Universal Cardholder Authentication Field (UCAF) For Authentication Data
Collection and Validation," filed on September 26, 2001, which is incorporated
herein
by reference in its entirety; this application also claims priority to the
following
additional applications, all of which are incorporated herein by reference in
their
entireties: U.S. Provisional Patent Application No. 60/280,776, entitled
"System and
Method for Secure Payment Application (SPA) and Universal Cardholder
Authentication," filed on April 2, 2001; U.S. Provisional Patent Application
No.
60/295,630, entitled "Method and Process for a Secure Payment Application
Using a
Universal Cardholder Authentication Field," filed on June 4, 2001; U.S.
Provisional
Patent Application No. 60/307,575, entitled "Method and System for Conducting
Transactions Over a Communication Network Using a Secure Payment Application,"
filed on July 24, 2001; U.S. Patent Application No. 09/886,486, entitled
"Method and
System for Conducting Secure Payments Over a Computer Network Without a
Pseudo or Proxy Account Number," filed on June 22, 2001; and U.S. Patent
' Application No. 091886,485, entitled "Method and System for Conducting
Secure
Payments Over a Computer Network," filed on June 22, 2001.
BACKGROUND OF THE INVENTION
On-line shopping offers unprecedented ease and convenience for
consumers, while enabling merchants to reduce costs and obtain new customers.
However, many consumers have been reluctant to take advantage of these
benefits
-1-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
due to fear of theft of sensitive information such as credit card numbers.
Efforts have
been made to increase the security of such information. For example, in the
secure
socket layer (SSL) technique, messages sent between the consumer and the
merchant
are encrypted, thereby making it more difficult for a third party to intercept
and use
the information. However, this method does not provide the merchant with any
verification of the identity of the consumer. Accordingly, if a third party
were to
obtain a credit card number by other fraudulent means such as theft of
physical credit
card, the SSL method would not prevent the third party from fraudulently using
the
stolen information.
Secure Electronic Transaction (SETT~) techniques attempt to solve the
foregoing problems by using digital certificates to authenticate the
consmner/cardholder, the merchant, and the credit card issuer. Each
certificate is
issued by a trusted certificate authority. While SETTM is currently the most
secure
way to handle payments over the Internet, it requires digital certificates and
cryptographic software to be installed and operated on the cardholder's
computer.
SUMMARY OF THE INVENTION
It is therefore an object of the present invention to provide a payment
system which enables a consumer to make on-line purchases without compromising
sensitive information such as the consumer's account number.
It is an additional object of the present invention to provide a payment
system in which the identity of a consumer is authenticated without requiring
the
issuance of a large number of digital certificates.
It is still a further object of the present invention to provide a payment
system in which information security is maintained and the identities of on-
line
consumers are authenticated, without requiring consumers to download large
software
files, and without employing computationally intensive calculations which
might slow
down the consumer's computer.
These and other objects are accomplished by the following aspects of
the present invention.
_2_

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
In accordance with one aspect of the present invention, user software
receives a set of Web page data to be used for displaying a Web page. The user
software determines whether the Web page includes one or more hidden fields.
If the
Web page includes the hidden fields, the user software selects a first payment
procedure to be performed. The first payment procedure includes filling the
hidden
fields with hidden data, in order to send the hidden data to a merchant. If
the Web
page does not include the hidden fields, the user software selects a second
payment
procedure to be performed. The second payment procedure includes filling one
or
more visible fields of the Web page with purchase data, in order to send the
purchase
I O data to the merchant.
In accordance with an additional aspect of the present invention, user
software receives a set of Web page data to be used for displaying a Web page
which
includes one or more hidden fields. The user software receives authentication
data
from a payment account issuer, the authentication data being for
authenticating the
identity of an account holder of a payment account issued by the payment
account
issuer. The user software fills the hidden fields with the authentication
data, in order
to send the authentication data to a merchant.
In accordance with yet another aspect of the present invention, user
software receives a first set of web page data to be used for displaying a
first Web
page. The user software determines whether the first Web page includes a first
hidden field. The first hidden field is for indicating that the Web page is
capable of
being used for performing a single-click payment procedure. The user software
fills
the first hidden field with data for informing a merchant that the user
software is
being used for performing at least one payment transaction.
BRIEF DESCRIPTION OF THE DRAWINGS
Further objects, features, and advantages of the present invention will
become apparent from the following detailed description taken in conjunction
with
the accompanying figures showing illustrative embodiments of'the invention, in
which:
-3-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Fig. 1 is a flow diagram illustrating an exemplary procedure for
conducting a payment transaction in accordance with the present invention;
Fig. 2 is a flow diagram illustrating an exemplary payment procedure
for use in the procedure illustrated in Fig. 1;
Fig. 3 is a flow diagram illustrating an additional exemplary payment
procedure for use in the procedure illustrated in:Fig. 1;
Fig. 4 is a block diagram illustrating an exemplary system for
conducting a payment transaction in accordance with the present invention;
Fig. 5 is a block diagram illustrating an additional exemplary system
for conducting a payment transaction in accordance with the present invention;
Fig. 6 is a flow diagram illustrating an exemplary authorization request
message verification procedure for use in the procedures illustrated in Figs.
2 and 3;
s
Fig. 7 is a flow diagram illustrating an additional exemplary
authorization request message verification procedure for use in the procedures
illustrated in Figs. 2 and 3;
Fig. 8 is a block diagram illustrating an exemplary account holder
authentication value (AAV) in accordance with the present invention;
Fig. 9 is a diagram illustrating an exemplary computer system for
conducting a payment transaction in accordance with the present invention; and
Fig. 10 is a block diagram illustrating an exemplary processing section
for use in the computer system illustrated in Fig. 9.
Throughout the figures, unless otherwise stated, the same reference
numerals and characters are used to denote like features, elements,
components, or
portions of the illustrated embodiments.
DETAILED DESCRIPTION OF THE INVENTION
Fig. 4 illustrates an exemplary system for performing secure payment
transactions in accordance with the present invention. The system includes
user
software 402, a merchant 404 selling goods and/or services, a payment
organization
-4-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
408 such as the MasterCard~ payment organization, and a payment account issuer
406. The user software 402 runs on an access device operated by a purchaser -
i.e.,
the purchaser is the user of the software 402. The access device can be, for
example,
a computer, a personal digital assistant (PDA), or a mobile telephone.
Preferably, the
access device runs a Web browser in addition to, or as part of, the user
software 402.
The Web browser preferably suppoxts name-based addressing of Web page fields,
in
order to enable identification of hidden and visible fields using names which
are
uniform for multiple merchants and account holders. The issuer 406 is
typically a
bank which has issued, to the purchaser, a credit card account or other
payment
account being used to purchase the goods and/or services from the merchant.
The
purchaser can be referred to as an account holder of the account. The system
uses
authentication data 414 which effectively travels in a loop from the issuer
406, to the
user software 402, to the merchant 404, to the payment organization 408, and
back to
the issuer 406, as is discussed in further detail below. The data 420 received
by the
issuer 406 should be derived from the original authentication data 414,
provided that
no improper operations have been performed upon the authentication data 414
during
its trip around the loop. Therefore, the issuer 406 can authenticate the
identity of the
account holder and verify the authenticity of the transaction based upon the
authentication data 414 and the data 420 received from the payment
organization 408.
Fig. 8 illustrates an example of a data structure 802 - referred to herein
as an Account Holder Authentication Value (AAV) - which can be used as the
authentication data 414 illustrated in Fig. 4. The AAV 802 comprises 24 bytes
of
binary data representing 32 Base-64-encoded characters. The first 14 bytes 808
can
generally be referred to as system data, and include a control byte 804 and
other
system data 806. The remaining 10 bytes 810 of data are defined by the issuer
406.
The control byte 804 provides information regarding the type of authorization
being
performed. Fox example, the control byte 804 has a hexadecimal value of "82"
for an
initial authorization or pre-authorization of account holder, and a value of
"02" for
subsequent authorizations of the account holder. Additional authentication
approaches are assigned their own control byte values. Fox example, a
biometrics-
-5-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
based authentication procedure would have its own value for the control byte
804.
Table I describes the various portions of the AAV 802.
Table I
# Data Element Length Data Description
1 Control Byte 804 1 Byte Value = hexadecimal "82" indicates
initial AAV
Value = hexadecimal "02" indicates
subsequent
AAV
2 Sale Amount 2 BytesConsists of the left-most 4 decimal
digits of the
12-digit sale amount with up to eight
leading
zeroes deleted. For example if the
12-digit
transaction amount presented by the
merchant
consists of 000008765432, the four
digits are
8765.
3 Sale Amount 4 Bits The above process for filling in
the Sale Amount
Truncation Field data can exclude some of the right-most
digits of
the original 12-digit amount. This
field indicates
how many such digits are so excluded.
For
example, if the 12-digit transaction
amount
consists of 000008765432, so that
the four
selected digits are 8765, then the
three right-most
digits of "432" would be excluded.
In this case
the Truncation Field would contain
the value "3".
4 Transaction 12 BitsConsists of the 3 decimal digit ISO
4217 currency
Currency Code code as included by the merchant
in its payment
page through a hidden field. Convert
the three
decimal digit Currency Code to binary,
right justify the resulting 10 bits
in a 12 bit field,
padded to the left with binary "00".
SHA-1 hash of 7 BytesConsists of the left-most 7 bytes
of the SHA-1
Merchant Name hash of the Merchant Name included
by the
merchant in the hidden field on its
payment page.
Merchant Name can first be edited
as discussed
below.
6 Merchant Transaction2 BytesA number generated by the merchant.
If this
Stamp (MTS) hidden field has a hexadecimal value
of "00 00,"
this indicates that a random number
has not been
generated.
7 Issuer-defined 10 BytesContains issuer-generated account
Data holder
810 authentication data. Preferably these
data
uniquely relate the transaction to
the account
holder.
-6-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
As is indicated in Table I, data element no. 1, a/k/a the control byte
804, is set to hexadecimal "82" for all AAVs associated with initial
authorizations,
including pre-authorizations. Elements 2-6 are the system data 806, which are
transaction-specific details provided by the merchant's Web site. Element
number 7
comprises the issuer-defined data 810. This element contains data that links
the
account holder to the particular transaction.
The system data 806 and the issuer-defined data 810 of the AAV 802
are generated and linked to a particular payment account by an AAV-generation
processor 440 operated by the issuer 406. Upon receiving a request 412 for
authentication of an account holder's identity, the AAV-generation processor
440
generates the system data 806 and the issuer-defined data 810 in binary
format. The
two sets of data 806 and 810, as well as the control byte 804, are combined to
form a
24-byte binary version of the 802. Base 64 encoding of the 24-byte binary
version
produces a 32-character, Base 64 version of the AAV 802.
The system data 806 are created based on the control byte 804 and on
information supplied from the merchant's confirmation page. The data 806 are
generated using the following procedure:
1. A control byte 804 is created for the AAV 802. The control byte 804
can be, for example, a binary-coded decimal representation of the hexadecimal
value
"82."
2. The Sale Amount is created by the following steps:
a) Up to 8 leading zeros are deleted from the Sale Amount
b) The first four remaining Sale Amount digits are placed in the
Sale Amount field as 4 binary coded digits.
3. The number of right-most digits of the Sale Amount that were
excluded in Step 2b is determined. This number, which is a single, binary-
coded
decimal digit, is placed in the Sale Amount Truncation Field.

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
4. The 3-digit decimal Currency Code is converted to binary, and the
resulting 10 bits are right justified in a 12 bit field and padded to the left
with binary
"~~,17
5. The Merchant Name, which is represented by a set of hexadecimal
Unicode control values, is edited using the following rules, but only if the
name is
expressed as a Latin-1 character set. All other character sets require no
editing.
a) All Latin-1 control characters are deleted. These are Unicode
characters in the hexadecimal range 0000 through 001F, and
007F through 009F.
b) With the exception of "&" (hexadecimal 0026), "@"
(hexadecimal 0040), "1/4" (hexadecimal OOBC), "1/2"
(hexadecimal OO~D), and "3/4" (hexadecimal OOBE), any
remaining Latin-1 non-alphanumeric character is replaced with
a space character (hexadecimal 0020). The Unicode non-
control and non-alphanumeric characters are those in the sets
0021 through 002F, 003A through 0040, OOSB through 0060,
007B through 007E, OOAO through OOBF, OOD7, and OOF7.
c) Any character in the General Punctuation character set (2000
through 206F) is replaced with a space character (0020).
d) Any Latin-1 numeric digits (0030) through (0039) beyond the
third such digit are deleted so as to include only the first three
numeric digits in the Merchant Name.
e) After completion of the prior steps (a) through (d), all
consecutive space characters (0020) are replaced with a single
space character (0020).
f) After completion of all prior steps, all leading and trailing
space characters are deleted.
_g_

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
6. An SHA-1 hash of the edited (or unedited) Merchant Name is created
and used to fill data element no. S listed in Table I.
7. The MTS from the merchant's payment screen is inserted into the
MTS field as a binary coded decimal.
The resulting 14-byte binary value is the system data 806 which will be
combined with the issuer-defined data 810 and then Base 64 encoded to create
the
AAV 802.
The procedure used to generate the issuer-defined data 810 depends on
which approach will ultimately be used to verify the AAV 802. For example, in
a
cryptographic approach, the issuer-defined data element 810 is generated by
encrypting a number, text string, or other data selected by the issuer 406.
For
example, the data to be encrypted can be a concatenation of the merchant name,
the
transaction amount, the date, and the account number of the account being used
to
make the purchase. The data is encrypted using a secret
key - discussed in further detail below - to generate a cryptographic Message
Authentication Code (MAC). Preferably, the MAC is generated by an ISO-approved
encryption algorithm. The MAC is incorporated into the issuer-defined data 810
which is combined with the system data element 804 and 806 to form the AAV
802.
During authorization, the issuer 406 cryptographically verifies the issuer-
defined data
element 810 to verify its authenticity. The cryptographic approach is
particularly
beneficial for systems in which the AAV 802 is created by one facility and
verified by
a different facility, and the two facilities are not in real-time
communication. For the
cryptographic approach, the issuer-defined data 810 in the AAV 802 includes
the data
elements described in Table II.
-9-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Table II
Data Type Description
AAV Format Number Indicates the format of the issuer-defined
data
810.
AAV-Generation Processor If this issuer uses multiple AA.V-generation
Identifier
processors, this is an indication
of which
processor produced this AAV.
Key Identification Data Used to identify the cryptographic
key used by
this AAV-generation processor to
generate the
AAV MAC.
Transaction Sequence NumberA unique number assigned to this
AAV by this
AAV-generation processor. It should
not repeat
during the longest expected life.of
any
transaction.
Message Authentication CodeA MAC generated using the above-identified
(MAC) key by the above-identified AAV-generation
processor, and based on the transaction's
account number and on the entire
AAV up to
the MAC field. It must use an ISO-approved
MAC algorithm.
Since the issuer-defined data 810 is limited to 10 binary bytes, it may
be sufficient to include only a portion of each of the above data elements.
Preferably,
the data 810 include four bytes of the MAC, four bytes of the Transaction
Sequence
Number, one byte of the Key Identification Data, and one byte total from the
combination of the AAV Format Indicator and the AAV-Generation Processor
Identifier.
The MAC serves as a cryptographic check to detect fraudulent
alteration. Both the AAV-generation processor 440 and the AAV-verification
processor 442 used to verify the transaction have access to the secret
cryptographic
key used to generate the MAC.
The AAV-generation processor 440 performs the following steps for
each transaction:
1. The following AAV data elements are created: AAV Format Number,
AAV Generation Facility Identifier and Key Identification Data.
-10-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
2. The Transaction Sequence Number used in the previous AAV is
incremented by a predetermined amount selected by the issuer 406. One or more
of
the right-most bits of the incremented value are used as the AAV Transaction
Sequence Number data element.
3. Using the key indicated by Key Identification Data, a MAC is created
by concatenating and encrypting the following data: (1) the account number
provided
to the merchant, (2) the entire AAV excluding the MAC sub-field itself, and
(3) any
other issuer-selected data. The left-most portion of the cryptographically
computed
MAC is issued as the AAV MAC data element.
In the cryptographic approach, the AAV-verification processor 442
determines the secret cryptographic key used by the AAV-generation processor
440 to
generate the MAC. Preferably, the two processors 440 and 442 share a secret,
cryptographic Key-Generation Key from which many (hundreds, thousands, or even
millions) of MAC-generation keys can be derived. The Key-Generation Key can be
used for years, whereas the MAC-Generation Key is preferably changed
relatively
frequently, depending upon the requirements of the MAC-generation algorithm
and
the issuer's key-management policy. In any case, however, the Key-Generation
Key
should be changed if there is any suspicion that it has been compromised.
The shared Key-Generation Key can, for example, be created by the
AAV- verification processor 442 and conveyed to the AAV-generation processor
440
as one or more key components, using multiple control (preferably triple
control) and
split knowledge. The generation and distribution of cryptographic keys should
conform to ISO security standards. Similarly, the mechanism by which a MAC-
Generation Key is derived from a Key-Generation Key should also conform to ISO
security standards. Furthermore, any cryptographic key stored within a storage
medium connected to an AAV-generation processor 440 or an AAV-verification
processor 442 preferably resides solely within physically secure hardware that
protects the key against physical compromise in accordance with ISO standards.
If an AAV-verification processor receives AAVs from more than one
AAV- generation processor, then any cryptographic key that the verification
-11-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
processor shares with one AAV-generation processor should not be related to
any key
it shares with another AAV-generation processor.
The following is an example of cryptographic generation of an AAV
for an initial transaction:
Initial Authorization Transaction Example Data:
Control Byte Value: 82
Sale Amount: $87654.32
Currency Code: 840
Merchant Name (Unicode representation of SFA Merchant, Inc.):
0053 0050 0041 0020 004D 0065 0072 0063 0068 0061 006E 0074 0020 0020 0049
006E 0063 002E
MTS: FOB
Issuer-defined data: 55390900400486471234
SHA-1 hash of merchant name (after editing as described above) = 31 98 BE 30
1F
BD 74 OF E2 AD 7E D2 ED 82 9E 69 06 EC E3 6F
Would Result in 24 binary byte Source:
82876538403198BE301FBD74FOAB55390900400486471234
Converts to 32 character Base 64 encoded string:
godIOEAxmL4wH7108I~tVOQkAQASHRxIO
The details for this example are as follows:
Map: AAAAAAAABBBBBBBBBBBBBBBBCCCCDDDDDDDDDDDD
Source: 0 2 8 7 6 5 3 8 4 0
Binary: 1000001010000111011001010011100001000000
s-sit:
word: 00 40 29 37 14 04
Base64: A o d 1 O E
Map:
EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFF
FFFFFFF
Source : 3 1 9 8 B E 3 0 1 F B D 7 4 F 0
A B
Binary:
00110001100110001011111000110000000111111011110101110100111100001
0101011
6-Bit:
-12-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
word: 00 49 38 11 56 48 07 59 53 52 60
Base64: A x m L 4 w H 7 1 0 8
K
5
Map: GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
Source: 5 5 3 9 0 9 0 0 4 0
10 Binary: 0101010100111001000010010000000001000000
6-Bit:
word: 45 21 14 16 36 00 16
Base64: t V 0 Q k A Q
Map: GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
Source: 0 4 8 6 4 7 Z 2 3 4
Binary: 0000010010000110010001110001001000110100
6-Bit: .
word: 00 18 07 17 49 08 52
Base64: A S H R x I 0
Result:
24 byte Source: 82 87 65 38 40 31 98 BE 30 1F BD 74 FO AB 55 39 09 00 40 04 86
4712 34
Converts to 32 character Base 64 encoded sMng:
godlOEAxmL4wH7108KtVOQkAQASHRxIO
The following is an example of cryptographic generation of an AAV
for a subsequent transaction:
Subsequent Transaction Example Date:
Control Byte Value: 82
Sale Amount: $87654.32
Currency Code: 840
Merchant Name (Unicode representation of SPA Merchant, Inc.):
0053 0050 0041 0020 004D 0065 0072 0063 0068 0061 006E 0074 002C 0020 0049
006E 0063 002E
MTS: FOAB
Issuer-defined data: 55390900400486471234
SHA-1 hash of merchant name (after editing as described above) = 31 98 BE 30
1F
BD 74 OF E2 AD 7E D2 ED 82 9E 69 06 EC E3 6F
Would Result in 24 binary byte Source: 02 87 65 38 40 31 98 BE 30 1F BD 74 FO
AB 55 39 09 00 40 04 86 47 12 34
-13-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Converts to 32 character Base 64 encoded string:
AodIOEAxTnL4wH7108KtVOQkAQASHRIO
The details for this example are as follows:
Map: AAAAAAAABBBBBBBBBBBBBBBBCCCCDDDDDDDDDDDD
Source: 8 2 8 7 6 5 3 8 4 0
Binary: 1000001010000111011001010011100001000000
6-Bit:
word: 32 40 29 37 14 04
Base64: g o d 1 O E
15
Map:
EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFFF
FFFFFFF
Source : 3 1 9 8 B E 3 0 1 F B D 7 4 F 0
A B
Binary:
00110001100110001011111000110000000111111011110101110100111100001
olololl
6-Bit:
5 word: 00 49 38 11 56 48 07 59 53 52 60
Base64: A x m L 4 w H 7 1 0 8
K
Map: GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
Source : 5 5 3 9 0 9 0 0 4 0
Binary: 0101010100111001000010010000000001000000
6-Bit:
3~ word: 45 2l 14 16 36 00 16
Base64: t V O Q k A Q
Map: GGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGGG
Source : 0 4 8 6 4 7 1 2 3 4
Binary: 0000010010000110010001110001001000110100
6-Bit:
word: 00 18 07 17 49 OS 52
. Base64: A S H R x I 0
Result:
24 byte Source: 82 87 65 38 40 31 98 BE 30 1F BD 74 FO AB 55 39 09 00 40 04 86
47 12 34
Converts to 32 character Base 64 encoded string:
godlOEAxmL4wH7108KtVOQkAQASHRxIO
Map Legend:
A - Control Byte value represented as Binary Coded Decimal (BCD)
B - Sale Amount - 4 most significant digits represented as BCD
C - Sale Amount Truncation Field - single digit represented as BCD
D - Currency Code - 3 digits represented as binary
-14-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
E - SHA-1 hash of Merchant Name - First 7 bytes of SHA-1 hash value
F - MTS - 2 byte value
G - Issuer-defined Data - 10 bytes of issuer-defined data represented as BCD
A comparative approach is preferred for systems in which the AAV
creation and verification facilities are in real-time communication with each
other -
e.g., via a common data storage system. In the comparative approach, the
issuer-
defined data 810 are generated using a random number or any other algorithm
selected by the issuer 406. The resulting value 810 is combined with the
system data
806 to form the AAV 802. The AAV 802 is then saved to a common database that
is
used by the AAV-verification processor 442 to verify transaction authenticity.
During
verifcation, the issuer 406 verifies the authenticity of a transaction by
comparing the
AAV received in the authorization request 420 to the AAV stored in the
database.
The AAV for the comparative approach is generated and stored according to the
following procedure:
1. Generate the issuer-defined data 810 in accordance with the issuer's
definition- e.g., by a random number generator.
2. The issuer-defined data 810 are stored in a database linking them at
least to a particular Account Number.
3. The merchant hidden field data are stored in a database linking them at
least to the issuer-defined data 810.
4. The database is made available to the AAV-verification processor 442.
5. The issuer-defined data component 810 is combined with the system
data component 808 to form a 24-byte binary value. The 24-byte binary value is
Base
64 encoded to generate the 32 character 702.
Fig. 1 illustrates an exemplary procedure for operating the payment
transaction system illustrated in Fig. 4 using authentication data 414 which
includes
the AAV 802 described above. In the illustrated procedure, the account holder
browses the various pages of a Web site available on a server 448 operated by
the
merchant 404 (step 132). The purchase finds and selects goods and/or services
that
(s)he would like to purchase from the merchant 404 (step 114). Once the goods
and/or services have been selected, the account holder initiates the
merchant's
-15-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
checkout procedure (step 116). For example, in the commonly used "shopping
cart"
method, a shopper selects goods and/or services to be placed in a virtual
shopping cart
- i.e., a list of items that the shopper tentatively plans to purchase. Once
the list of
items is completed to the satisfaction of the shopper, the shopper initiates
checkout by
clicking on a visible "checkout" button on the merchant's Web page, at which
point
the checkout procedure begins with respect to the items in the shopping cart.
Another
possible method employs a single-click checkout procedure in which the
merchant
404 stores account holder information and then uses the information for
multiple
transactions. The stored information can include the account holder's billing
and
shipping addresses, e-mail address, account number, and account expiration
date. The
account holder can then immediately initiate checkout with respect to an item
(step
116) by clicking on a visible "purchase" button associate with the item.
In accordance with standards promulgated by the issuer 406, if the
merchant's Web site is configured to enable single-click purchasing, each of
the
merchant's web pages on which single-click purchasing is offered includes a
particular hidden field which can be referred to as the "UCAF Enabled
Indicator"
field, and is described in further detail below. The presence of this hidden
field on a
Web page notifies the user software that the Web page is configured for single-
click
shopping.
Once the checkout phase has been initiated (Step 116), if the UCAF
Enabled Indicator field is not present on the Web page (step 128), the user
software
402 requests and receives additional Web page data 410 from the merchant 404
through a portion 426 of a network 434 (step 102). The network 434 can, for
example, be the Internet. The Web page data is used to display a "checkout"
Web
page (a/k/a an "order confirmation" Web page) on the account holder's computer
screen. The account holder and/or user software 402 provides billing address,
shipping address and/or payment account details to the merchant 404 by
entering
some or all of this information into fields on the confirmation page (step
130). The
billing and shipping address information can be entered manually by the
account
holder, filled in automatically by the user software 402, or filled in
automatically by
the merchant's server based on information stored in the merchant's server for
the
-16-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
particular account holder. To confirm the order, the account holder clicks a
visible
"submit" button on the confirmation page (step 132). If the Web site of the
merchant
404 is configured to operate using the authentication data 414 discussed
above, the
merchant's order confirmation page will contain one or more hidden fields,
including:
(1) hidden fields for delivering information to the user software 402; and (2)
hidden
fields for receiving information such as an AAV from the user software 402.
The
hidden fields, which are collectively referred to herein as the "Universal
Cardholder
Authentication Field" (UCAF), are described in further detail below. Through
the
UCAF on the confirmation page, the user software 402 receives some or all of
the
following information:
Table III
Data Type Definition
Merchant Name The merchant provides its name in a hidden field
that is 88
characters in length. These 88 hexadecimal characters
(0-9, A-F)
consist of 22 sets of 4 hexadecimal digits.
Each set corresponds to a
control character in the Unicode character set
table
(www.unicode.org).
Card Acceptor The merchant provides its Card Acceptor City
in a hidden field
City which is 13 characters in length.
Card Acceptor The merchant provides its Card Acceptor State
or Country code (if
State/ Countrynot US) in a hidden field that is 3 characters
in length. If Country
Code Code, the 3 character, alphabetic country code
is supplied.
Currency Code This is the 3-digit ISO 4217 currency code associated
with the
currency in which the purchase is being transacted.
Sale Amount This represents the amount of the sale as mutually
agreed upon by
the merchant and the account holder and reflects
the amount
presented to the account holder during the checkout
process. This
amount may differ than the actual authorization
amount due to
processing issues such as split payments, split
shipments, currency
conversion, etc. Sale Amount displayed by the
SPA wallet uses the
currency format indicated by the Currency Code.
Merchant An optional two-byte number included at the
merchant's discretion.
Transaction This field, if included, is a value generated
by the merchant between
Stamp 00 O1 and FF FF inclusive. If not included,
the hidden field is still
present but is filled with the value of 00 00.
UCAF This is a blank hidden field that merchant presents
in order to collect
Authenticationauthentication data. This field is filled by
the user software 402.
Data Field
Account NumberA hidden field that the merchant uses to provide
up to 5 digits of the
stored account number registered with the merchant
and expected to
-17-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Data Type Definition
be used to process the transaction with all
remaining digits masked
or not provided. The account number contained
in this field can be
overwritten by issuers or account holders to
ensure the account
number provided is directly associated with
any authentication data
generated and populated in the UCAF Authentication
Data field
such as an AAV.
Expiration A blank hidden field that is populated by an
Month issuer or account holder
with the month the payment card number expires.
Expiration A blank hidden field that is populated by an
Year issuer or account holder
with the year the payment card number expires.
CVC2 A blank hidden field that is populated by an
issuer or account holder
with the CVC2 linked to the payment card number.
UCAF Brand A hidden field that is populated by the merchant
to denote specific
payment brands accepted for on-line payments.
For example, the
UCAF Brand field can have the value of "01"
for Brand A and "02"
for Brand B.
UCAF Enabled A blank hidden field used by single-click merchants.
This hidden
Indicator field mimics the function of an Order Confirmation
Page and
enables the user software 402 to automatically
activate and to supply
account holder payment details to the merchant
payment pages.
AAV Submit A hidden, virtual button that the user software
402 automatically
clicks after form fill is completed at a single-click
merchant. By
clicking this button, the user software 402
sends the AAV data 802
to the merchant 404.
Cardholder This is a hidden field that the merchant presents
on the receipt page
Confirmation to notify the issuer 406 that the account holder
submitted the
transaction. This field is filled by the merchant
404 with a value of
"1" to indicate the transaction has been submitted.
Exemplary values of these hidden fields included within the
merchant's Order Confirmation Page are provided below. The exemplary values
are
based on the following transaction details:
Merchant Name: SPA Merchant, Inc.
Merchant Location: Purchase, NY
Transaction Amount: $87654.32 USD
Fields populated by merchants:
<INPUTtype="HIDDEN"name="Ucaf Merchant Name"value="0053005000410020
004D 00650072006300680061006E0074002C00200049006E0063002E">
<INPUT type="HIDDEN" name="Ucaf City"value="Purchase">
-18-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
<INPUT type--"HIDDEN" name--"Ucaf State Country" value--"NY">
<INPUT type--"HIDDEN" name--"Ucaf Currency Code" value--"840">
<INPUT type--"HIDDEN" name--"Ucaf Sale Amount" value=000087654321">
<INPUT type--"HIDDEN" name--"Ucaf MTS" value="FOAB">
<INPUT type--"HIDDEN" name--"Ucaf Brand" value--"O1"
Fields populated by issuer server
<INPUTtype="HIDDEN"name="Ucaf Authentication Data"value="
godlOEAxmL4wH7108KtVOQkAQASHRxIO">
<INPUTtype="HIDDEN"name--"Ucaf Payment Card Number"value--"
1234567899874563">
<INPUTtype="HIDDEN"name--"Ucaf Payment Card ExpDate Month"value--"
02">
<INPUTtype="HIDDEN"name--"Ucaf Payment Card ExpDate Year"value--"
2004>
<INPUTtype="HIDDEN"name--"Ucaf Payment Card CVC2"value--" 256">
For merchants who wish to receive recurring payments from a
particular account holder, the following information is collected within the
UCAF
structure:
Transaction Frequency - indicates the frequency of recurring
payments. The valid values that can be assigned by a merchant are "W" for
weekly,
"M" for monthly, and "Q" for quarterly or "A" for annually.
Number of Payments - in order to determine the total number of
recurring payments between an account holder and merchant. This field
preferably
does not have a default maximum limit. Each Brand that utilizes this recurring
payment function may set its own implementation limits. For example, a
suitable
maximum number of payments is 260.
First Payment - this field conveys whether the account holder
acknowledges entering a recurring payment relationship and the date expressed
as
DDMMYYYY of the first recurnng payment.
-19-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Merchant Cancellation Policy - this field notes whether the account
holder can cancel the recurring payments. Value is either "1" for Yes or "0"
for No.
The recurring payment elements can optionally be combined into a
single hidden field defined for UCAF. This additional hidden field is named
Ucaf Recur Payment, and includes the following portions:
~ "F NNN DDMMYYYY C", where
~ F - is the frequency of the recurring payment. Valid values are:
W- weekly, M- monthly, Q- quarterly, A- annually
~ NNN - is the number of recurring payments.
~ DDMMYYYY - is the date of the first recurring payment. For
example
March 29, 2002 is expressed as "29032002."
~ C -is the merchant cancellation policy. This denotes whether the
cardholder can cancel the recurring payment. Valid values are "1"
for yes and "0" for no.
For example, if the merchant 404 supports recurring payments that are
established as monthly for 1 year with the first payment on March 1, 2001, and
if the
account holder is permitted to cancel transactions, then the value of
Ucaf Recur Payment would be "M 12 01032001 1". This approach eliminates the
need for the merchant 404 to repeatedly fill multiple hidden fields for
recurring
payments, because the information is consolidated into a single hidden field.
The merchant 404 can optionally include a Merchant Transaction
Stamp (MTS) in one of the hidden fields on the merchant's payment page. The
MTS
is unique to each transaction and can therefore be used as an added form of
security.
In particular, the MTS can be used to show that the account holder has
actually visited
the merchant's Web site, thereby providing evidence that the transaction is
legitimate
and not a retransmission by a fraudulent merchant or other party posing as an
authentic merchant.
-20-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
For transactions other than single-click purchases, the order
confirmation page also includes visible fields for displaying to the account
holder
information such as the Merchant Name and Sale Amount. The fact that the
merchant's name and the transaction amount are visible on the confirmation
page
before the shopper clicks the confirmation button (step 210 discussed below
with
respect to Fig. 2) provides additional evidence that the account holder has
indeed
confirmed and accepted the transaction. This feature helps the issuer 406 to
challenge
any repudiation of the transaction by the account holder.
Referring again to Fig. 1, if the order confirmation Web page of the
merchant 404 includes the above-described hidden fields (step 104), then the
purchase
is made using an authorization procedure 106 which utilizes the aforementioned
technique of sending authentication data 414 in a loop from the issuer 406, to
the user
software 402, to the merchant 404, to the payment organization 408, and back
to the
issuer 406. On the other hand, if the order confirmation Web page does not
include
1 S the hidden fields (step 104), then the user software 402 performs a
conventional
payment procedure 108 which includes filling visible fields of the Web page
with
purchase data such as a credit card number, expiration date, etc. (step 110),
and using
the filled Web page fields to send the purchase data to the merchant 404 for
authorization (step 112).
If, in step 128, the UCAF Enabled Indicator field is present on a Web
page on which the account holder has clicked a "purchase" button, then the
user
software 402 fills the UCAF Enabled Indicator field with a code (e.g., "O1 ")
notifying
the merchant 404 that the account holder is using UCAF-enabled user software
402
for performing the payment transaction (step 134). The Web page with the
filled
UCAF Enabled Indicator field is submitted to the merchant 404 (step 136). The
merchant 404 sends confirmation page data to the user software 402 (step 138)
However, the purchaser only sees a page or window with a simple message such
as,
e.g., "Order Being Processed." While this message is being displayed, the user
software 402 automatically fills various hidden fields on the confirmation
page with
the account holder's address information and account number (step 140).
Authentication procedure 106 is then performed.
-21-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
In any case, if authorization is granted by authorization procedure 106
or authorization procedure 108 (step 118), the good and/or services are
shipped,
delivered, or otherwise provided to the purchaser (step 120). Any conventional
clearing and settlement procedure can be used to clear and settle payment
betyveen the
issuer 406 and the payment organization 408 (step 122). If the merchant 404
has an
account with an acquirer (item 514 in Fig. 5, discussed below), payment is
cleared
and settled between the issuer 406 and the acquirer 514 (step 122).
On the other hand, if authorization is denied (step 118), then the
account holder is notified of the denial (step 124), and the transaction is
terminated
(step 126). '
An example of a procedure 106 for using the authentication data 414 to
authorize a transaction is illustrated in Fig. 2. Incorporating the
information received
from the hidden fields in the merchant's order confirmation page and/or
provided by
the account holder, the user software 402 sends to the issuer 406 a request
412 for
authentication of the identity of the account holder (step 202). The request
412 is sent
through a portion 428 of the network 434. In response to the request 412 for
authentication of the account holder identity, the issuer 406 sends
authentication data
414 such as an AAV to the user software 402 through the network portion 428.
Once
the user software 402 has received the authentication data 414 from the-issuer
406
(step 204), the software 402 includes the authentication data 414 in hidden
data 416
(step 206) and uses the hidden data 416 to fill the hidden fields on the Web
page of
the merchant 404 (step 208). Fox example, the AAV can be entered into a hidden
Authentication Data field on the confirmation page.
Preferably, each account holder is authenticated for each transaction.
If the identity of the account holder is not successfully authenticated, the
account
holder is notified of this failure. If the identity of the account holder has
been
confirmed, the issuer's AAV-generation processor 440 generates an AAV 802. The
issuer 406 then includes the AAV 802 in the authentication data 4I4 and sends
the
data 414 to the user software 402.
-22-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Other information entered into hidden fields on the confirmation page
by the user software 402 include the account holder's payment account details
such
his/her account number, expiration date and, optionally, the card validation
check
(CVC2) value. In addition, the hidden fields preferably include the above-
described
UCAF Enabled Indicator field. Optionally, the user software 402 can identify
any
difference between the account number supplied by the merchant (if the account
holder was profiled) and the account number inserted into the hidden Account
Number field. The user software 402 can alert the account holder of any
difference
and request confirmation. In some cases, an account holder may have multiple
accounts registered with the issuer 406. In such cases, the account holder
selects
which account number is to be used for payment.
Once the hidden fields of the confirmation Web page have been filled,
the page contains hidden data 416, including the authentication data 414
(which itself
includes the AAV 802), the payment account information, and any other relevant
information. The confirmation page is submitted to the merchant 404 by
clicking a
"submit" button on the page (step 210). If this is, e.g., a shopping cart type
transaction, the submit button is visible to the account holder, and is
clicked by the
account holder. However, for single-click transactions, the submit button is
hidden,
and is automatically clicked by the user software 402.
The merchant 404 receives the hidden data 416 on the confirmation
page, and validates the Control Byte 804 and the hash of the Merchant Name
contained in the AAV 802. Optionally, the merchant 402 can also verify the
Merchant Transaction Stamp (if generated by the merchant) and Sale Amount.
The merchant 404 preferably captures and retains the AAV for future
use in linking the account holder to a specific transaction. The data can also
be used
for performing subsequent authorizations of split-shipments, and may be of
value to
the merchant 404 during exception processing.
In order to ensure the merchant 404 has not received a fraudulent AAV
802, the control byte 804 is verified by confirming that its most significant
bit is a
-23-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
"1." This can be done by verifying that the left-most character of the Base 64
encoded AAV 802 is a lower case "g."
The Merchant Name is verified by confirming that the hash of the
Merchant Name, as included in the AAV, exactly matches the hash of the
Merchant
Name that was included in one of the hidden fields. To accomplish this, the
merchant
404 verifies that characters 7 through 16 of the Base 64 encoded AAV 802
exactly
match a pre-computed value. This pre-computed value can be obtained by
performing
the SHA-1 hash process of the Merchant Name.
For example an AAV may be:
godlOEAxmL4wH7108KtVOQkAQASHRxIO
The merchant verification process would parse out characters 7-16:
AxmL4wH710
The merchant 404 compares this value to the known SHA-1 hash of
the Merchant Name. If the value is not successfully validated, the merchant
404
declines the transaction.
Optionally, the merchant 404 can also validate the AAV sale amount
based on the sale amount presented in one of the hidden fields. The merchant
404
converts the Base 64 encoded AAV 802 to its 24 binary byte source and
identifies the
Sale Amount, Sale Amount Truncation Field and Transaction Currency Code. The
merchant 404 validates the Sale Amount, Sale Amount Truncation Field and
Transaction Currency Code in accordance with the data descriptions in Table I
and
the Sale Amount and Currency Code presented via hidden fields. If the values
are not
successfully validated, then the merchant 404 declines the transaction.
Optionally, the merchant 404 can also validate the MTS contained in
the AAV 802. When validating the MTS, the merchant 404 identifies the MTS
component of the AAV 802 and compares it to the MTS presented in the Order
confirmation page hidden field. If the value is not successfully validated,
the
merchant 404 declines the transaction, because the AAV 802 is likely to be
fraudulent.
-24-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
The merchant 404 derives an authorization request message 418 from
the hidden data 416 (step 222), and sends the authorization request message
418 to the
payment organization 408 through an additional network or network portion 430
(step
212). Because the hidden data 416 includes the authentication data 414, the
authorization request message 418 is ultimately derived from the
authentication data
414.
The authorization request message 418 preferably includes at least the
following data elements:
~ Account holder's Payment Account Number to be supplied to the
merchant
~ Merchant Name
~ Currency Code
~ Sale Amount
~ Merchant Transaction Stamp (default value is set to hexadecimal
"00 00" by the merchant 404 if this element is not being used)
Optionally, the following data elements can also be included:
~ Card Acceptor City
~ Card Acceptor State/Country
Because the hidden data 416 and authorization request message 418
contain sensitive, transaction-specific data and may be transmitted over a
public
network such as the Internet, the hidden data 416 and the authorization
request
message 418 are preferably protected using a secure encryption method - e.g.,
128-
bit SSL or equivalent - in order to prevent the data from being compromised.
The payment organization 408 sends an authorization request message
-25 420 to the issuer 406 through yet another network or network portion 432
(step 214).
The authorization request message 420 sent from the payment organization 408
to the
issuer 406 is typically identical to, or derived from, the authorization
request message
418 sent from the merchant 404 to the payment organization 408. The issuer 406
uses
-25-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
a verification procedure 216 to process the authorization request message 420,
in
order to generate an authorization response message 422.
Fig. 6 illustrates an exemplary procedure 216 for use by an issuer 406
processing an authorization request message 420 to generate an authorization
response message 422 such as is discussed above with respect to Figs. 1 and 2.
The
exemplary procedure 216 illustrated in Fig. 6 employs a cryptographic
verification
approach suitable for use with the cryptographically generated AAV 802
described
above. In the illustrated procedure 216, a cryptographic AAV-verification
processor
442 operated by the issuer 406 performs the following steps for each
authorization
request message 420 received by the facility:
Security Level Routing:
1. If security level indicator is set to a value of 1 (step 602), the
verification processor 442 verifies that the account number is registered for
the
UCAF-based verification system (step 604). If the account is registered (step
604),
the processor 442 declines the transaction (step 606) because such a scenario
indicates
that: (i) the account holder did not use his/her UCAF-enabled software 402 to
process
the payment transaction; or (2) an unauthorized third party has initiated the
transaction.
a) If the account is not UCAF-registered (step 604), the
authorization request is forwarded to an authorization system
configured for conventional (i.e, non-UCAF based) payment
processing (step 608).
2. If the security level indicator is set to 2 (step 602), the processor 442
proceeds with the AAV Verification process described below.
AAV Verification:
1. The AAV is extracted from the authorization request message, Base 64
decoded, and interpreted based on the indicated data format (step 610).
2. Using the AAV's I~ey Identification Data, its AAV-Generation
Processor Indicator, and its Transaction Sequence Number, the verification
processor
442 determines the cryptographic key to be used for MAC verification (step
612).
-26-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
3. Using the appropriate MAC algorithm, the processor 442 attempts to
verify the MAC within the AAV 802 (step 614). If the MAC is not successfully
verified (step 616), the transaction is declined (step 618), because the AAV
802 is not
valid and the transaction is therefore assumed to be fraudulent.
4. If the Control Byte of the AAV indicates that this is an initial
authorization request (step 620):
a) The processor 442 checks whether the same Transaction
Sequence Number (from the AAV-generation processor 440)
and Sale Amount has already occurred in a previous initial
authorization that was received more than "n" seconds ago
(where "n" is to be specified by the issuer, and typically equals
60) (step 626).
i) Note: This optional delay of, e.g., 60 seconds, is to
allow for the automatic retransmission of an
authorization request message if the corresponding
authorization response message has been lost.
b) If the Transaction Sequence Number has already occurred in a
previous authorization-request message that was received more
than "n" seconds ago (step 626), then the transaction is
declined; this Transaction Sequence Number from this AAV-
generation processor 440 is a "detected duplicate" (step 628).
The attempted transaction involves a fraudulent replay of a
previously valid AAV.
c) If the Transaction Sequence Number has not already occurred
(step 626), then the AAV's Transaction Sequence Number is
identified as "used" for future transactions (step 632).
d) Optionally, after verifying the AAV 802 in this initial
authorization request, the issuer 406 can check the registration
status of the account holder and automatically register the
account holder (step 634).
-27-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
e) The AAV is thus confirmed to be valid, and the transaction is
therefore successfully verified (step 630). An indication of
successful verification is included in the authorization response
message 422.
5. If the AAV's Control Byte 804 indicates that this is a subsequent
authorization request (step 620), and if the AAV's Transaction Sequence Number
is a
"detected duplicate" for the AAV-generation processor 440 being used (step
622),
then the transaction is declined (step 624). This is a merchant-originated
resubmission of an already replayed SPA transaction.
6. On the other hand, if the TSN is not a detected duplicate (step 622),
then the AAV is valid, and the transaction is therefore successfully verified
(step
630). An indication of successful verification is therefore included in the
authorization response message 422.
To perform verification, the AAV-verification processor 442 of the
issuer 406 preferably maintains a record of every account number that has been
registered for performing UCAF-based authentication. In addition, the AAV-
verification processor 442 stores the Key-Generation Key (or keys) that it
shares with
each AAV-generation processor 440. The verification processor 442 also stores
records indicating which AAVs it has already received, in order to detect a
fraudulent
replay of an account number and its associated AAV.
AAV verification can also be performed using a comparative approach.
For example, in the verification procedure 216 illustrated in Fig. 7, the AAV-
verification processor 442 performs the following steps for each authorization
request
message:
1. If security level indicator is set to "1" (step 602):
a) The processor 442 determines whether the account number is
registered for the UCAF-based system (step 604). If the
account is registered (step 604), the transaction is declined (step
606), because such a scenario indicates that the account holder
did not use his/her UCAF-enabled software 402 to process the
_2g_

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
payment transaction, or that an unauthorized third party
initiated the transaction.
b) If the account is not UCAF registered (step 604), the
authorization request is forwarded to the issuer's authorization
system for conventional (i.e., non-UCAF-based) payment
processing (step 608).
2. If the security level indicator is set to "2" (step 602):
a) The processor 442 determines whether the account number has
been registered for the UCAF-based system (step 702). If so
(step 702), the issuer 406 extracts the AAV from the
authorization request (step 706) and continues with further
processing, discussed below.
b) If the account is not registered (step 702), the transaction is
declined (step 704).
3. If the account is registered (step 702), then after step 706, the AAV
802 of the authorization request message is Base 64 decoded (step 708).
4. If the Control byte of the AAV indicates that this is an initial
authorization request (step 710), the following A.AV procedure is performed
based on
a comparison of A.AV transaction information stored in the issuer's database
with
transaction data contained in the authorization request message 420:
a) The processor 442 verifies that the AAV received in the
authorization request matches an entry in the issuer's database
(step 712). If there is no matching entry (step 712), the
transaction is declined (step 714).
b) If the AAV received is determined to be valid based on a
positive match (step 712), the processor 442 verifies that the
issuer-defined data 810 have not been received in a prior
transaction. Optionally, if the issuer-defined data 810 have
been received in a prior transaction more than "n" seconds ago
(where "n" typically equals 60) (step 716), then the transaction
-29-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
is declined and the AAV 802 is labeled as a detected duplicate
(step 718).
c) If the issuer-defined data element has not been previously
received (step 716) then the issuer-defined data 802 are labeled
as "used" (step 720), and additional validation of the issuer
defined data 810 is performed (step 722).
d) The additional data validation can include comparing data
captured from the merchant hidden fields with data contained
in the authorization request message 420 (step 722). This
allows the issuer 406 to validate additional fields such as the
Account Number and the Merchant Name. If the data are
successfully validated (step 722), then the verification of the
AAV 802 is successful (step 726). An indication of successfixl
verification is therefore included in the authorization response
message 422. If the data do not match (step 722), then the
transaction is declined (step 724).
5. If the Control byte of the AAV indicates that this is a subsequent
authorization request (step 710), the following steps are performed:
a) If the issuer-defined data 810 are a "Suspected Duplicate" data
set (step 728), the processor 442 declines the transaction (step
730).
b) If the issuer-defined data 810 were received in an initial
authorization and are not a "Suspected Duplicate" data set (step
728), then the processor 442 performs additional validation
checks by comparing data captured from the merchant hidden
fields with data contained in the authorization request message
420 (step 722). This allows the issuer 406 to validate the
Account Number and Merchant Name. If the data match (step
722), then the verification is successful (step 726), and an
indication of successful verification is therefore included in the
authorization response message 422.
-30-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Regardless of whether a cryptographic or comparative verification
approach is used to generate the authorization response message 422, the
issuer 406
sends the authorization response message 422 to the payment organization 408
through network or network portion 432 (step 218). The payment organization
408
sends an authorization response message 424 to the merchant 404 through
network or
network portion 430 (step 220). The authorization response message 422 sent
from
the payment organization 408 to the merchant 404 is typically identical to, or
derived
from, the authorization response message 422 sent from the issuer 406 to the
payment
organization.
Optionally, the payment organization 408 can perform the verification
procedure 216 on behalf of the issuer 406, in which case the payment
organization
408 includes its own verification processor 446 which processes the
authorization
request message 418 to generate authorization message 424. In other words, the
payment organization 408 can "stand in" for the issuer 406 in the role of
processing
authorization request messages to generate authorization response messages.
Such
"stand-in processing" can be especially beneficial if the issuer's
authorization system
is temporarily unavailable, because it eliminates the need to send an
authorization
request message 420 to the issuer 406 to be processed for generating an
authorization
response message 422; the authorization response message 422 from the issuer
406 is
unnecessary.
In any case, regardless of whether the verification procedure 216 has
been performed by the issuer 406 or the payment organization 408, if the
authorization response message 424 received by the merchant 404 includes an
approval of the transaction (step 118 of Fig. 1), the merchant 404 presents an
HTML-
based receipt page to the account holder in order to confirm completion of the
transaction. This page preferably contains a reference number fox use with
customer
inquiries. In addition, the receipt page hosts a hidden transaction
identification field
which is not visible to the account holder but which can be read by the user
software
402 for the purpose of identifying completed transactions. The goods are then
shipped and/or the services are provided (step 120). Any conventional clearing
and
-31-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
settlement procedure can then be used to clear and settle the payment between
the
issuer 406 and the payment organization 408 (step 122).
Fig. 5 illustrates an additional system fox performing secure payment
transactions in accordance with the present invention. Similarly to the system
illustrated in Fig. 4, the system illustrated in Fig. 5 includes user software
402, a
merchant 404, a payment organization 408, and a payment account issuer 406.
However, the system illustrated in Fig. 5 also includes an acquirer S I4. The
acquirer
514 is typically an acquiring bank with which the merchant 404 has an account.
Authentication data 414 is included in data which travels in a loop from the
issuer
406, to the user software 402, to the merchant 404, to the acquirer 514, to
the payment
organization 408, and back to the issuer 406, whereupon the issuer confirms
that the
authentication data 414 have not been improperly altered or otherwise tampered
with.
Similarly to the system illustrated in Fig. 4., the system illustrated in Fig.
5 is operated
in accordance with the procedure illustrated in Fig. 1. However, the payment
procedure 106 used in conjunction with the system illustrated in Fig. 5
includes the
acquirer 514 in the loop through which the authentication data 414 and the
other
data/messages travel, as is discussed in further detail below.
Fig. 3 illustrates an exemplary payment procedure I06 fox use with the
system illustrated in Fig. 5. In the illustrated procedure 106, the user
software 402
sends to the issuer 406, through network portion 428, a request 412 for
authentication
of the identity of the account holder making the purchase of goods and/or
services
from the merchant 404 (step 202). In response to the request 412 for
authentication,
the issuer 406 sends authentication data 414 through network portion 428, and
the
authentication data 414 is received by the user software 402 (step 204). The
user
software 402 includes the authentication data 414 in hidden data 416 (step
206), and
uses the hidden data 416 to fill the hidden fields in the Web page of the
merchant 404
(step 208). The user software 402 sends the hidden data 416 to the merchant
404
through network portion 426 (step 210), as discussed above with respect to the
procedure illustrated in Fig. 2. The merchant 404 derives an authorization
request
message 506 from the authentication data 416 (step 222), and sends the
authorization
request message 506 to the acquirer 514 through an additional network or
network
-32-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
portion S02 (step 302). The acquirer S14 sends an authorization request
message S08
to the payment organization 408 through yet another network or network portion
S04
(step 304). The authorization request message SO8 sent from the acquirer S 14
to the
payment organization 408 is typically identical to, or derived from, the
message 506
S sent from the merchant 404 to the acquirer S 14. The payment organization
sends an
authorization request message 420 to the issuer 406 through network or network
portion 432 (step 306). The authorization request message 420 sent from the
payment
organization 408 to the issuer 406 can be identical to, or derived from, the
message
S06 sent from the merchant 404 to the acquirer S 14, and/or can be identical
to, or
derived from, the message S08 sent from the acquirer S 14 to the payment
organization
408. The issuer 406 uses a verification procedure 216 to process the
authorization
request message 420 received from the payment organization 408, in order to
generate
an authorization response message 422. The issuer 406 sends the authorization
response message 422 to the payment organization 408 through network or
network
1S portion 432 (step 308). The payment organization 408 sends an authorization
response message S 10 to the acquirer S 14 through network or network portion
S04
(step 310). The authorization response message S 10 sent from the payment
organization 408 to the acquirer S 14 is typically identical to, or derived
from, the
message 422 sent from the issuer 406 to the payment organization 408.
Optionally, the payment organization 408 can perform the verification
procedure 2I6 on behalf of the issuer 406, as is discussed above with respect
to the
system illustrated in Fig. 4. If such stand-in processing is to be performed
by the
payment organization 408, then the payment organization 408 processes
authorization
request message S08 to generate authorization response message S 10.
2S In any case, regardless of whether the verification procedure 216 has
been performed by the issuer 406 or the payment organization 408, the acquirer
S 14
sends an authorization response message S 12 to the merchant 404 through
network or
network portion S02 (step 312). The authorization response message S 12 sent
from
the acquirer S I4 to the merchant 404 can be identical to, or derived from,
the message
422 sent from the issuer 406 to the payment organization 408, and/or can be
identical
-33-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
to, or derived from, the message S10 sent from the payment organization 40~ to
the
acquirer S 14.
Preferably, the account holder registers with the issuer 406 before
downloading the user software 402 for use in AAV-based transactions.
S The registration process provides the following beneficial features:
~ Strong authentication of the account holder
~ Account holder registration with the issuer 406
~ Downloading of user software 402 to the account holder's
computer
~ To obtain the user software 402, the account holder first accesses the
issuer's online banking Web site which is accessible from the issuer's Web
server
444. If the account holder has already registered for access to the issuer's
online
banking site, the account holder logs in using his/her existing access
credentials.
These credentials are verified using any conventional online banking account
holder
1 S authentication method.
If the account holder has not yet registered for access to the issuer's
online banking site, the issuer 406 requires the account holder to register
prior to
obtaining the user software 402. Preferably, the issuer 406 strongly
authenticates the
identity of the account holder before or during registration, in order to
ensure the
security of subsequent transactions performed with the user software 402. Once
the
account holder has been successfully authenticated, the registration process
proceeds
with account holder profile initialization. The account holder is presented
with an
option to continue registering for the user software 402. Selection of the
continued
registration option navigates the account holder's Web browser to the user
software
2S registration page. This page presents the account holder with a list of
accounts that
can be registered for the software 402, and requests various pieces of
information
from the account holder in order to set up the account holder's profile within
the
issuer's verification processor 442. The information preferably includes at
least the
following:
~ Account Number
-34-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
~ Account Expiration Date
~ Account CVC2 Verification Value
The following additional information can also be collected during
profile initialization:
~ Account Holder Name
~ Account Holder Billing Address
~ Account Holder Shipping Address
Optionally, the issuer 406 can automate the profile set-up based on
account holder information which is available from the issuer's online banking
site.
Automating some or all of this process avoids requiring the account holder to
re-enter
this information, thus providing the account holder with a more convenient
registration experience.
The data collected from the account holder or from the automated
interface are sent to the issuer's verification processor 442 as part of the
account
holder's registration request. For systems in which the verification processor
442 is
operated by an organization external to the issuer, the request and its
resulting
response should be adequately protected during transmission between
organizations.
For example, the security of the request and response can be ensured by
sending these
messages over a protected, private network connection, or by encrypting the
message
prior to transmission over a public network such as the Internet. The issuer's
verification processor 442 processes the registration request and responds
with either:
(a) a confirmation that the registration was completed successfully; or (b) an
indication that the registration failed, along with a message describing the
reason for
the failure.
Issuers should select a strong authentication mechanism that will
ensure that the account holder being registered online can be properly
identified and
validated. When issuers implement the registration process, they should keep
the
following guidelines/preferences in mind when identifying shared secrets that
can be
used for authentication purposes:
-35-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
~ Multiple pieces of information, rather than just one piece, should
be used for the shared secret. For example, the account holder's
mother's maiden name and the last four digits of his/her social
security number can be used in combination with an issuer-
s generated password.
~ The shared secret should be verifiable. For example, if the
account holder's mother's maiden name is to be used, the
authorization system should be able to verify this information.
~ Knowledge of the entire shared secret should require access to
multiple sources. It is preferable to avoid using a shared secret
that is available completely within one document and/or from
public information. For example, should the issuer 406 choose to
use credit line and address information, both pieces of this shared
secret are available on the account holder's monthly account
statement. If the statement is intercepted, then the shared secret
will be compromised.
~ The issuer 406 can optionally use several pieces of information to
determine the shared secret. For example, the following
information can be used:
~ A bank-generated password sent to the billing address of the
account holder in a mailer which is separate from the statement.
~ A CVC2 which is only available on the signature panel of
card.
~ A verifiable non-public number such as the last four digits of
the account holder's social security number.
~ The Credit Line on the account (available on the monthly
account statement).
After successful registration, the account holder can download and
install the user software 402 onto his/her access device - typically a
computer, PDA,
or mobile telephone. The account holder's access device is preferably
configured to
run the user software 402 as a part of the initialization/startup sequence of
the device,
-36-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
in order to cause the user software 402 to be activated automatically when the
account
holder navigates to a merchant's purchase page.
Upon activation and display, the user software 402 requests the
account holder's access credentials in order to authenticate the account
holder's
identity during purchase transactions. The access credentials are typically
managed
by the issuer 402 and preferably include some or all of the following:
~ Userid/password
~ Smart card/PIN
~ Password released wallet secret
~ Biometric verification
~ Digital certificates)
~ Any other secure, issuer-approved authentication mechanism
In order to maximize cardholder security and to provide strong
cardholder authentication to the issuer, authentication is preferably
performed for
each transaction, through the issuer's verification processor 442.
Optionally, the issuer 406 can choose to store data that tracks AAV
generation and account holder transactions. Tracking the history of AAV
generation,
including the AAV, Card City, Card State/Country and Brand can be of
assistance to
the issuer 406 in supporting dispute management and chargeback processes. In
addition, the issuer 406 can challenge account holder repudiation based on its
records
of authentication events and account holder confirmations of transactions.
Such a
challenge is typically based on the AAV, Card City, Card State/Country and
Brand
associated with each transaction. The issuer 406 can also choose to make the
sale
history available online to the account holder, thereby reducing the number of
customer service inquires.
In the case of a purchase involving a split shipment, the merchant 404
preferably requests and obtains authorization for each part of the shipment.
When
processing a subsequent authorization due to a split shipment, the merchant
404
modifies the Control Byte 804 contained on the initial authorization AAV 802
from
-37-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
hexadecimal "82" to hexadecimal "02." Failure to modify the Control Byte 804
for a
subsequent authorization will result in a decline of authorization by the
issuer 406.
The merchant 404 may wish to re-transmit an authorization request
after an initial issuer decline. If so, the A.AV 802 is transmitted as a
subsequent
authorization with the Control Byte 804 modified from hexadecimal "82" to
hexadecimal "02."
In some cases, the merchant 404 may generate, for a given transaction,
a second authorization request having an AAV with the same value as the AAV in
the
original request. The second authorization request may not be bit-wise
identical to the
original request. For example, the requests might have different system-trace
ID
numbers. The merchant 404 would typically generate a second authorization
request
if
~ The merchant 404 does not receive a response to the original
authorization request within a pre-determined time-out period; or
~ The merchant 404 fully reverses the original authorization, but later
decides to re-instate it.
The merchant 404 preferably treats such authorization requests as
subsequent authorization requests by flipping the most significant bit of the
control
byte 804. This will prevent such requests from being erroneously rejected by
the
issuer 406 as possible replay attacks.
It will be appreciated by those skilled in the art that the methods of
Figures 1-7 can be implemented on various standard computer platforms
operating
under the control of suitable software defined by Figs. 1-7. In some cases,
dedicated
computer hardware, such as a peripheral card in a conventional personal
computer,
can enhance the operational efficiency of the above methods.
Figs. 9 and 10 illustrate typical computer hardware suitable for
practicing the present invention. Referring to Figure 9, the computer system
includes
a processing section 910, a display 920, a keyboard 930, and a communications
peripheral device 940 such as a modem. The system can also include a printer
960.
The computer system typically includes one or more disk drives 970 which can
read
-38-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
and write to computer-readable media such as magnetic media (i.e., diskettes)
and/or
optical media (e.g., CD-ROMS or DVDs), for storing data and application
software.
While not shown, other input devices, such as a digital pointer (e.g., a
"mouse") and
the like can also be included. Computer hardware such as is illustrated in
Figs. 9 and
can be used to run the user software 402 illustrated in Figs. 4 and 5, and/or
can be
used to perform the functions of the merchant 404, merchant's server 448,
acquirer
514, payment and organization 408, verification processor 446, issuer 406, AAV-
generation processor 440, verification processor 442, and/or issuer's server
444.
Figure 10 is a functional block diagram which further illustrates the
10 processing section 910. The processing section 910 generally includes a
processing
unit 1010, control logic 1020 and a memory unit 1030. Preferably, the
processing
section 910 can also include a timer 1050 and input/output ports 1040. The
processing section 910 can also include a co-processor 1060, depending on the
microprocessor used in the processing unit. Control logic 1020 provides, in
conjunction with processing unit 1010, the control necessary to handle
communications between memory unit 1030 and input/output ports 1040. Timer
1050
provides a timing reference signal for processing unit 1010 and control logic
1020.
Co-processor 1060 provides an enhanced ability to perform complex computations
in
real time, such as those required by cryptographic algorithms.
Memory unit 1030 can include different types of memory, such as
volatile and non-volatile memory and read-only and programmable memory. For
example, as shown in Fig. 10, memory unit 1030 can include read-only memory
(ROM) 1031, electrically erasable programmable read-only memory (EEPROM)
1032, and random-access memory (RAM) 1033. Different computer processors,
memory configurations, data structures and the like can be used to practice
the present
invention, and the invention is not limited to a specific platform. For
example,
although the processing section 910 is illustrated in Figs. 9 and 10 as part
of a
computer system, the processing section 910 and/or its components can be
incorporated into a PDA or a mobile telephone.
-3 9-

CA 02442814 2003-10-O1
WO 02/079911 PCT/US02/10356
Although the present invention has been described in connection with
specific exemplary embodiments, it should be understood that various changes,
substitutions, and alterations apparent to those skilled in the art can be
made to the
disclosed embodiments without departing from the spirit and scope of the
invention as
set forth in the appended claims.
-40-

Dessin représentatif
Une figure unique qui représente un dessin illustrant l'invention.
États administratifs

2024-08-01 : Dans le cadre de la transition vers les Brevets de nouvelle génération (BNG), la base de données sur les brevets canadiens (BDBC) contient désormais un Historique d'événement plus détaillé, qui reproduit le Journal des événements de notre nouvelle solution interne.

Veuillez noter que les événements débutant par « Inactive : » se réfèrent à des événements qui ne sont plus utilisés dans notre nouvelle solution interne.

Pour une meilleure compréhension de l'état de la demande ou brevet qui figure sur cette page, la rubrique Mise en garde , et les descriptions de Brevet , Historique d'événement , Taxes périodiques et Historique des paiements devraient être consultées.

Historique d'événement

Description Date
Inactive : CIB en 1re position 2016-07-20
Inactive : CIB attribuée 2016-07-20
Inactive : CIB attribuée 2016-07-20
Inactive : CIB expirée 2012-01-01
Inactive : CIB expirée 2012-01-01
Inactive : CIB enlevée 2011-12-31
Inactive : CIB enlevée 2011-12-31
Inactive : CIB désactivée 2011-07-29
Demande non rétablie avant l'échéance 2011-07-21
Inactive : Morte - Aucune rép. dem. par.30(2) Règles 2011-07-21
Réputée abandonnée - omission de répondre à un avis sur les taxes pour le maintien en état 2011-04-04
Inactive : Abandon. - Aucune rép dem par.30(2) Règles 2010-07-21
Inactive : Dem. de l'examinateur par.30(2) Règles 2010-01-21
Lettre envoyée 2007-08-15
Exigences de rétablissement - réputé conforme pour tous les motifs d'abandon 2007-07-24
Modification reçue - modification volontaire 2007-05-14
Lettre envoyée 2007-04-10
Réputée abandonnée - omission de répondre à un avis sur les taxes pour le maintien en état 2007-04-02
Exigences pour une requête d'examen - jugée conforme 2007-03-02
Toutes les exigences pour l'examen - jugée conforme 2007-03-02
Requête d'examen reçue 2007-03-02
Inactive : Regroupement d'agents 2006-08-08
Inactive : CIB de MCD 2006-03-12
Inactive : CIB dérivée en 1re pos. est < 2006-03-12
Inactive : CIB de MCD 2006-03-12
Lettre envoyée 2004-01-30
Inactive : Transfert individuel 2003-12-22
Inactive : Page couverture publiée 2003-12-11
Inactive : Lettre de courtoisie - Preuve 2003-12-09
Inactive : Notice - Entrée phase nat. - Pas de RE 2003-12-08
Demande reçue - PCT 2003-10-23
Exigences pour l'entrée dans la phase nationale - jugée conforme 2003-10-01
Demande publiée (accessible au public) 2002-10-10

Historique d'abandonnement

Date d'abandonnement Raison Date de rétablissement
2011-04-04
2007-04-02

Taxes périodiques

Le dernier paiement a été reçu le 2010-03-18

Avis : Si le paiement en totalité n'a pas été reçu au plus tard à la date indiquée, une taxe supplémentaire peut être imposée, soit une des taxes suivantes :

  • taxe de rétablissement ;
  • taxe pour paiement en souffrance ; ou
  • taxe additionnelle pour le renversement d'une péremption réputée.

Veuillez vous référer à la page web des taxes sur les brevets de l'OPIC pour voir tous les montants actuels des taxes.

Historique des taxes

Type de taxes Anniversaire Échéance Date payée
Taxe nationale de base - générale 2003-10-01
TM (demande, 2e anniv.) - générale 02 2004-04-02 2003-10-01
Enregistrement d'un document 2003-12-22
TM (demande, 3e anniv.) - générale 03 2005-04-04 2005-03-22
TM (demande, 4e anniv.) - générale 04 2006-04-03 2006-04-03
Requête d'examen - générale 2007-03-02
TM (demande, 5e anniv.) - générale 05 2007-04-02 2007-07-24
Rétablissement 2007-07-24
TM (demande, 6e anniv.) - générale 06 2008-04-02 2008-03-31
TM (demande, 7e anniv.) - générale 07 2009-04-02 2009-04-01
TM (demande, 8e anniv.) - générale 08 2010-04-06 2010-03-18
Titulaires au dossier

Les titulaires actuels et antérieures au dossier sont affichés en ordre alphabétique.

Titulaires actuels au dossier
MASTERCARD INTERNATIONAL INCORPORATED
Titulaires antérieures au dossier
ARTHUR KRANZLEY
BRUCE RUTHERFORD
CARL CAMPBELL
EDWARD J. HOGAN
STEPHEN ORFEI
Les propriétaires antérieurs qui ne figurent pas dans la liste des « Propriétaires au dossier » apparaîtront dans d'autres documents au dossier.
Documents

Pour visionner les fichiers sélectionnés, entrer le code reCAPTCHA :



Pour visualiser une image, cliquer sur un lien dans la colonne description du document. Pour télécharger l'image (les images), cliquer l'une ou plusieurs cases à cocher dans la première colonne et ensuite cliquer sur le bouton "Télécharger sélection en format PDF (archive Zip)" ou le bouton "Télécharger sélection (en un fichier PDF fusionné)".

Liste des documents de brevet publiés et non publiés sur la BDBC .

Si vous avez des difficultés à accéder au contenu, veuillez communiquer avec le Centre de services à la clientèle au 1-866-997-1936, ou envoyer un courriel au Centre de service à la clientèle de l'OPIC.


Description du
Document 
Date
(aaaa-mm-jj) 
Nombre de pages   Taille de l'image (Ko) 
Description 2003-10-01 40 1 994
Revendications 2003-10-01 38 1 915
Dessins 2003-10-01 9 227
Abrégé 2003-10-01 2 85
Dessin représentatif 2003-12-10 1 12
Page couverture 2003-12-11 2 57
Avis d'entree dans la phase nationale 2003-12-08 1 204
Courtoisie - Certificat d'enregistrement (document(s) connexe(s)) 2004-01-30 1 107
Rappel - requête d'examen 2006-12-05 1 118
Accusé de réception de la requête d'examen 2007-04-10 1 176
Courtoisie - Lettre d'abandon (taxe de maintien en état) 2007-05-28 1 176
Avis de retablissement 2007-08-15 1 165
Courtoisie - Lettre d'abandon (R30(2)) 2010-10-13 1 164
Courtoisie - Lettre d'abandon (taxe de maintien en état) 2011-05-30 1 172
PCT 2003-10-01 5 221
PCT 2003-10-01 1 59
Correspondance 2003-12-08 1 27
Taxes 2006-04-03 1 54
Taxes 2007-07-24 1 29
Taxes 2008-03-31 1 35
Taxes 2009-04-01 1 36
Taxes 2010-03-18 1 37